/tech/ - Technology

Where proprietary software comes to die

Posting mode: Reply

Name
Email
Subject
Comment
Password
Drawing x size canvas
File(s)

Remember to follow the rules

Max file size: 350.00 MB

Max files: 5

Max message length: 4096

Manage Board | Moderate Thread

Return | Catalog | Bottom

Expand All Images


(195.81 KB 1600x1009 ja0.jpg)
(30.10 KB 400x400 ja1.jpeg)
Jacob Appelbaum leaves the Tor Project Anonymous 06/03/2016 (Fri) 23:57:29 [Preview] No. 4587
The fuck is up with this, /tech/?

Tight-lipped statement from Tor Project management (Shari Steele): https://web.archive.org/web/20160603234207/https://blog.torproject.org/blog/jacob-appelbaum-leaves-tor-project

Slanderous accusations on twatter: https://web.archive.org/web/20160603234349/https://news.ycombinator.com/item?id=11831629

Link mentioned by someone on the mailing list:
https://lists.torproject.org/pipermail/tor-dev/2016-June/011029.html


Anonymous 06/04/2016 (Sat) 01:25:51 [Preview] No. 4588 del
https://www.youtube.com/watch?v=EXEUE__ap08
> Appelbaum: FBI
> Appelbaum: We are proud to work with Facebook

NEVUR FORGET

REEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE


Anonymous 06/04/2016 (Sat) 03:18:54 [Preview] No. 4591 del
(1.35 KB 300x300 OUTPUT.png)
ask him yourself, make him post something with his key.

irregardless: Even if he's Satan himself, and his reasons for leaving have nothing to do with code, and the code's good, code's good.

E-celeb thread is still e-celeb. The thread would be better if OP would have posted something like:

Jacob Appelbaum leaves Tor, his commit changes under scrutiny:
https://gitweb.torproject.org/tor.git/log/?qt=grep&q=Jacob+Appelbaum
https://gitweb.torproject.org/tor.git/log/?id=f79a75f59731eab85c019c41827c0c0e89d90498&qt=committer&q=jacob%40appelbaum.net


Anonymous 06/04/2016 (Sat) 04:59:41 [Preview] No. 4596 del
(1.86 MB 640x360 1464980101360.gif)
>>4587

So some of the Twitterati are claiming that Jake is a practitioner of the struggle snuggle, and that that's why he is parting ways with Tor.

I never cared for him, but my instinct with these Twitter rape accusations is always not to believe them, probably partially in reaction to a sentiment expressed in that HN thread, which is that it's obvious that if he's being accused of rape, then he should be let go from the Tor project because he's obviously a rapist.

I don't find that obvious at all. There's been no suggestion (that I've seen) that Applebaum has actually been formally accused of anything, that he's been investigated, arrested, or charged, let alone convicted. What that means is that people who are willing to make fake rape accusations hold an enormous amount of power over innocent people. Unfortunately, there are many such women in the world. True psychopathy is rare, occurring in about 1% of the population, but that still means that there are millions of women walking around who will destroy a man with no qualms if they are inclined to do so. And given the power of social media mobs to get people fired, or evicted, or otherwise ruin their lives, it doesn't even take much effort.

SJWs want to argue that sex is no big deal, and that it's not only okay but desirable for them to be "sluts", but then want to act like rape is the worst crime in the world, the only one for which the accused should be assumed to be guilty until he can be proven innocent. Then, of course, they go on to trivialize actual rape by so watering down the concept that it becomes meaningless.


Anonymous 06/04/2016 (Sat) 05:48:52 [Preview] No. 4597 del
So far, there's no information about this. People are accusing Jake for being a "rapist", probably in a figurative way.
Some others are writing (((Jake))), which is a sign to say that he's a Jew.
Well, fuck it. I like his talks on CCC, though, would be bad if he stop doing that too.


Anonymous 06/04/2016 (Sat) 07:16:05 [Preview] No. 4602 del
There was a link on Hacker News earlier today that linked to a site accusing Applebaum of being a rapist. They shut that link down so quick. Faster than the ((( Jew ))) meme article yesterday.


Anonymous 06/04/2016 (Sat) 17:06:23 [Preview] No. 4620 del
>>4596
Here's the issue: Why does it even matter if said person is a rapist, illuminati, and devil servant?
If the code is godsend, and veritably fuzzed, IT'S GODSEND.

Identity politics yield no stakes to merits. Judge a committer by their code, not their self

All I see hearsay.

-----
I've never seen that arm and leg exercise, so I had to replicate.
Said character needs to do it on a pillow or bed, like I did, as to not harm the stomach, diaphragm and crotch.

>>4602
I dislike that too on HHN, biased moderation just cause. I barely go there now, if at all. It's too many cliques acting like they know things, without actually reporting something new, innovative, a hacker feat!

>>4597
heh, someone should ask him in one about this whole shit


Anonymous 06/04/2016 (Sat) 19:22:43 [Preview] No. 4628 del
(72.21 KB 600x750 9380728962.jpg)
>@puellavulnerata
>puella vulnerata

>caring about calumnious statements of someone who defines identity based on their self proclaimed victim status

op pls


Anonymous 06/04/2016 (Sat) 21:50:32 [Preview] No. 4633 del
Op here. I don't understand why some of you make it sound like I placed any value on the groundless claims by some random SJW whore. I said in the OP that this is slander.

To clarify why I considered this noteworthy enough to create a thread:

1. Did you look at the announcement on the Tor Project blog? Appelbaum has been quite a visible face and voice for the Tor Project for a bunch of years, and yet all the CEO (or whatever) can dedicate to the announcement is 1 (one) single sentence? Why?

2. A number of people have speculated that Appelbaum has had, at some point, access to an NSA informant other than Snowden (one of them is Bruce Schneier who himself has seen at least a part of the Snowden documents). Add to that these baseless accusations and I was immediately reminded of Julian Assange (hence the first pic).

This made me think that this was yet another case of unfounded accusations meant only to discredit, silence, and eventually extinguish a perceived adversary. Probably with political motivation.

So I wonder what's the truth behind the statement that he "stepped down" from his employment position. Did they fire him based on nothing but loud, high pitched, whining?


Anonymous 06/04/2016 (Sat) 22:35:02 [Preview] No. 4635 del
>>4620
>implying he wrote good code

he's just a pr guy. seems like your typical sjw who takes all the credit. example: he'd push for alphabetical ordering on academic papers to make it look like he did the most work

sage for gossip thread


Anonymous 06/05/2016 (Sun) 01:17:44 [Preview] No. 4654 del
>>4591
>Irreguardless

Heh heh


Anonymous 06/05/2016 (Sun) 01:19:28 [Preview] No. 4655 del
>>4591
>Irreguardless

Heh heh


Anonymous 06/05/2016 (Sun) 04:42:34 [Preview] No. 4666 del
(98.30 KB 634x469 13884651634.png)
>>4634

It is really surprising that someone would post rape allegations on twitter before any official reports are out, therefore committing a potential crime. I don't believe that Jacob has gotten v& already since he talked to tor-project members according to the statement and in Germany you wouldn't be allowed to do that when you are in investigative custody which is very likely in case of rape.

Anyway, if a judge doesn't rule like expected then you are actually the one who committed a serious crime. Further you will lose your reputation.

So why risk so much? For a couple of retweets? To say 'told you so' afterwards? Just to break the news?

I don't see the incentive, the twitter fags in question don't appear that shallow.

I bet this is a ruse and Jacob will be fighting extradition soon.


Anonymous 06/05/2016 (Sun) 06:10:58 [Preview] No. 4669 del
(149.38 KB 831x864 daniel.png)
(123.11 KB 914x726 sam.png)
(58.10 KB 374x785 forest.png)


Anonymous 06/05/2016 (Sun) 06:36:54 [Preview] No. 4670 del
(81.24 KB 736x459 rushittingmegrin.jpg)
>>4669

>nonconsensual washing


Anonymous 06/05/2016 (Sun) 14:19:34 [Preview] No. 4676 del
(110.19 KB 611x717 lel.jpeg)
>>4669
>This has to be fake


Anonymous 06/05/2016 (Sun) 14:40:37 [Preview] No. 4678 del
Shit like this makes me hate social networks as a whole.


Anonymous 06/05/2016 (Sun) 15:13:37 [Preview] No. 4680 del
>>4669
>This has to be fake
Yeah this shit sounds extremely made up by a bunch of sexual deviants. The names and sexes of the "victims" don't make sense.

You ever heard of an actual female with a real vagina named "Forest"?

I think these are all jealous faggots and Jake didn't want to fuck any of them, but they were all fucking each other and tried to pressure him. I think Jake never fucked any of these "women".


Anonymous 06/05/2016 (Sun) 15:56:45 [Preview] No. 4682 del
(49.78 KB 584x302 kaepora.png)
(47.45 KB 579x320 frameslip.png)
(546.83 KB 408x408 puellavulnerata.png)
>>4680
>The names and sexes of the "victims" don't make sense.

Just some meaningless names ... who cares?

>>4681
> https://archive.is/dnJFU


Anonymous 06/05/2016 (Sun) 15:58:04 [Preview] No. 4683 del
>>4669
It seems to me like the "erotic stories" websites... anyone?


Anonymous 06/05/2016 (Sun) 16:01:48 [Preview] No. 4684 del
it's all very sus and confusing, here's what I currently think:

from the sound of these stories, the tor developers are fucking, sleeping in the same beds, getting drunk at weird semi-orgies. somehow he stepped over the line, it didn't really get dealt with properly. nobody got around to scolding him properly and he didn't learn.

when I hear 'rape' I think a masked guy running up to an unknown woman in the night and violently forcing her into a dark alley. The accusations we are hearing are much closer to watered down college-bro-rape.

it's weird though because he's obviously a homo but then on wiki:

> Appelbaum is an atheist[42] of Jewish background and identifies himself as queer, "though he refers to at least a dozen female lovers in nearly as many countries

the reports are probably true - he's some kind of public/3some sex maniac, craved strange kinky things that he couldn't get in a regular relationship really bad and didn't understand other peoples boundaries or that they were repulsed by that.

- he did some socially unacceptable advances on people

- in his head it probably made sense maybe he though they liked him or he had a chance, in theirs it was creepy and gross and broke consent.

I first heard about this via andrea which made me strongly believe it's all fake. It's confusing that maradydd is involved in pushing these accusations out though, she adds some credibility to it (for example she was involved in the save lambdaconf thing)...

but then again she has some beef with him about plagarism. nadim (the sjw cryptocat nigger) seems to be extremely sadistic about the whole thing and pleasuring himself to all this. Also had plagarism beef with applebaum. Coincidentally the hate site uses jscrypto (same kind of broken thing cryptocat is based on). It really doesn't seem like he actually did plagarism, more they're just butthurt that he's more academically prominent than them. anklebiters.

lessons:

- never work with women

- stick to conventional relationships like you see on sitcoms otherwise people will think they were raped 5 years later when feminists redefine the term further


Anonymous 06/05/2016 (Sun) 16:12:08 [Preview] No. 4686 del
>>4669
Want to make pleasure on a *very* intimate friend is not rape.
Want to wash you back is not rape. She/he were not forced to enter the bathroom, she/he did it by their own.
Ask for a threesome is not rape.

What's the problem with these people? Everything now is "rape" in murica? Rape is when you really (physically) force someone, and penetrate she/he.

Now, for example, let's support you are fat. Someone call you "fat guy". If you want, you can call the cops and say it was a "rape", because you think it's a sexual word and you get excited when someone call you "fat guy". Now.... what the fuck? I see this situation as the same.
Also, no proof. They could just be lying about it. As in the Assange case, there's probably many people that want to get Jacob in prison. He also is (was) learning about PQ crypto, which is a very sensitive subject for feds.


Anonymous 06/05/2016 (Sun) 16:25:35 [Preview] No. 4688 del
>>4682
This "puellavulnerata" image is actually from the supposed tranny Isis, from this thread >>>/tech/3142


Anonymous 06/05/2016 (Sun) 16:28:46 [Preview] No. 4689 del
It seems cryptome also think it's all bullshit:
https://twitter.com/Cryptomeorg/status/739410225598476288


Anonymous 06/05/2016 (Sun) 16:35:51 [Preview] No. 4690 del
>>4684

>the reports are probably true

The allegations are wrong unless proven otherwise.
What we have here is public shaming and nothing else so far.

>>4687

Appelbaum openly encouraged people to hack government agencies to cause some real damage.

It really smells like he was set up, then the NSA triggered feminist cunts to fuel the ruse.

We have to take a much closer look at the Tor commit history from now on.

>>4686

Feminism is becoming the norm and everything else is misogyny. Nothing new here.


Anonymous 06/05/2016 (Sun) 16:50:33 [Preview] No. 4691 del
>I was intoxicated and not thinking clearly, and it took me a long time to realize that Jacob was going down on me, in the living room, in front of everyone. I told him that I didn't want to do that, and he stopped, but I don't remember what happened directly after, except that he kept touching me. The next thing I realized was that one of his friends in the room was touching me instead of Jacob, and Jacob told me to go down on his friend. I asked them to stop, however, all of this had a really long delayed effect because I was under the influence.

>intoxicated
>under the influence

hahahahaha! This is hilarious. They probably did psilocybin shrooms and she couldn't keep the linear flow of the time.


Anonymous 06/05/2016 (Sun) 16:51:20 [Preview] No. 4692 del
>>4633
>CEO (or whatever) can dedicate to the announcement is 1 (one) single sentence? Why?
ask him yourself m8. Nothing will come out of talking to us here.
>of people have speculated that Appelbaum has had, at some point, access to an NSA informant
And? What does that have to do with >>>/tech/?
>yet another case of unfounded accusations meant only to discredit,
And? This shit belongs more on >>>/pol/ or >>>/n/, and you know it.
>Did they fire him based on nothing but loud, high pitched, whining?
He left, read the statements. Seriously m8, what do you hope to accomplish here, by posting on /tech/? More hearsay and rumors?

>>4635
>Jacob Appelbaum leaves Tor, his commit changes under scrutiny:
>https://gitweb.torproject.org/tor.git/log/?qt=grep&q=Jacob+Appelbaum
>https://gitweb.torproject.org/tor.git/log/?id=f79a75f59731eab85c019c41827c0c0e89d90498&qt=committer&q=jacob%40appelbaum.net
try harder m8

>>4666 >>4687
Dude, how is this /tech/ related? Also hi marked one*
I comprehend your curiosity, but explain to me why you merit a technology board to seek interest in it?

The one way I know to defeat defamation is not to care. See the big picture: Some guy leaves a project, defamation campaign starts, code still intact and still under constant scrutiny.

What technological feat is being achieved here?
None? then create another thread IN ANOTHER BOARD!

If you are already a meritocrat, then yippee, you are 17 steps ahead of the common population.

Wanna talk about a real important issue? Tor is still vulnerable to many vector attacks thanks to ECHELON. What ways can we defeat this hydra?

>>4678
I see no use in it. Why I never joined one.

>>4669 >>4676 >>4681 >>4682
>>>/lolcow/

>>4684
Why do you think fraternizing with colleagues is always a bad idea?
Also, HOW IS THIS /tech/ related?


Anonymous 06/05/2016 (Sun) 16:59:08 [Preview] No. 4693 del
>>4692
you're a retard!


Anonymous 06/05/2016 (Sun) 17:00:06 [Preview] No. 4694 del
>>4692
GET OUT FED! Your tatic will not work here.
Jacob is a very well know guy from /tech/ community. His actions, even if not directly related to tech, will change how the things work for /tech/ related software project. Jacob was (is?) a member of CCC, and was a member of cypherpunks and Cult of the Dead Cow, both groups that *defined* how we see cyber privacy today.


Anonymous 06/05/2016 (Sun) 17:07:41 [Preview] No. 4697 del
(428.74 KB 983x532 problemofficer.jpg)
>>4692

Here on /tech/ you are powerless

U mad?


Anonymous 06/05/2016 (Sun) 17:21:37 [Preview] No. 4700 del
did you see the weird incoherent stories about him on tumlbr?


Anonymous 06/05/2016 (Sun) 17:31:18 [Preview] No. 4701 del
>>4694
Why does it matter who he is, than what he's done?

Also, why are people technology???

Here's how a meritocrat sees it, for dumb people like >>4693 >>4697 :
Some user uploaded several commits to an anonymity project for several years, said user becomes committer, resigns after 2 years, noise happens.

Their contribution to the project is intact, most of it superseded, and scrutinized over 30 times already.

What, in Gaia's planetary name, does this relate to technological feats and achievements?

-----
If you want to talk bout the person post a thread in an appropriate board. Resumes and Vitae mean nothing to technology.


Anonymous 06/05/2016 (Sun) 17:32:37 [Preview] No. 4702 del
>>4701
stop posting retard!


Anonymous 06/05/2016 (Sun) 17:50:21 [Preview] No. 4703 del
(26.06 KB 1352x202 shill.png)
>>4701

Another pathetic try to derail the thread

Looks like this topic is triggering the JTRIG shills


Anonymous 06/05/2016 (Sun) 17:50:31 [Preview] No. 4704 del
(262.50 KB 768x1210 D3sVN.jpg)
>>4702
While I know you are joking here, at a funny way to ad hominem & insult, look at the big picture of what you are doing.

Imagine for a second I am Jacob, and I asked you to not consider my individuality as a factor to my merits.

What have I done so wrong to warrant this defamation attempt on my life, after I worked hard speaking to people about the importance of privacy and anonymity, worked my ass off reporting infidelities, lies, and corruptions, and even helped out on a project I saw worth in advancing?

A name and title, while ECHELON members get away with deanonymizing millions of users, while destroying the very fabric of democracy?

>stop posting retard!
Just those words alone, can break the best of Samaritans only wanting to help.


-----
I care not whatever occurred to Jacob, or what he plans to do from here on out. But I do know that this little corner in this vast huge network communities is willing to look past identity politics, than the very technology we admire and cherish.

If you need me still spell this out to you, this is an e-celeb thread, that perhaps needs to be looked at in >>>/pol/ since circumstances warrant investigation on their own. But they have little to no interest to technocrats.


Anonymous 06/05/2016 (Sun) 18:46:15 [Preview] No. 4707 del
(25.65 KB 751x90 pgp.png)
> Domain Name: JACOBAPPELBAUM.NET
> Creation Date: 27-may-2016

> Creation of PGP-Key: 2016-05-26 (jacobsvictims@gmail.com)

This isn't just a random hit against Appelbaum but has been set up long before.
>nonconsensual washing
And really badly too, it is remarkable!

Are there any older rape allegations against Appelbaum predating the current events?


Anonymous 06/05/2016 (Sun) 19:42:32 [Preview] No. 4712 del
>>4684
Nah I think my theory has more supporting "evidence": he didn't want to fuck any of those hideous trannies and they kept trying to fuck him for months while fucking each other. Then through some perceived slight against them they became "triggered" to seek "revenge".

The reality is I highly doubt there is an actual woman (female sex) with a real clitoris (part of female sex genatalia) named "Forest".

The poor sex starved/crazed trannies didn't get to fuck Jake, fantasized about it for months, and then set him up for revenge because they didn't get to poz his neghole.


Anonymous 06/05/2016 (Sun) 19:45:39 [Preview] No. 4713 del
>>4692
>Also, HOW IS THIS /tech/ related?
Hey, faggot, what is TOR and who are its developers?


Anonymous 06/05/2016 (Sun) 23:14:12 [Preview] No. 4721 del
https://medium.com/@nickf4rr/hi-im-nick-farr-nickf4rr-35c32f13da4d

this is amazing, the entire thing is such a blatant rewritten memory.


Anonymous 06/06/2016 (Mon) 02:28:40 [Preview] No. 4729 del
>>4721
how? all he said was the guy is kind of an asshole. i mean, fair enough giving an alleged rapist the benefit of the doubt when it was just a couple of allegations but now a lot of well respected people close to him are saying he's always been a sociopath and a poser. why are you shilling for him so hard? last month you all hated him for being a sjw and now you guys will defend him to the death against all evidence to the contrary? i don't get you /tech/

he's probably cointelpro like weev says


Anonymous 06/06/2016 (Mon) 02:34:47 [Preview] No. 4730 del
Jacob Appelbaum, like Edward Snowden, is sharing nothing new nor useful, ergo, disinformist by proxy, if they are not agents.


Anonymous 06/06/2016 (Mon) 02:57:41 [Preview] No. 4732 del
(421.30 KB 696x860 666.png)
>>4729

>but now a lot of well respected people close to him are saying he's always been a sociopath and a poser.

You are right, due process is so pre web 2.0

> all he said was the guy is kind of an asshole.

see
>> 4676
and
https://archive.is/GdQBG

> why are you shilling for him so hard?

n1 nsa shill

>he's probably cointelpro like weev says

>> 4730
> Jacob Appelbaum, like Edward Snowden, is sharing nothing new nor useful, ergo, disinformist by proxy, if they are not agents.

kill yourself


Anonymous 06/06/2016 (Mon) 03:55:19 [Preview] No. 4735 del
>>4732
Let me make a comparison. Edward Snowden is like Evalion: everything they say had already been said by someone else and only serves to give a basic red pill to normalfags. If you didn't know what Snowden revealed already, you're basically out of the loop. Same concept applies to Appelbaum.

What Jacob Appelbaum shared in here is shit I've heard about before I watched this vid: https://www.youtube.com/watch?v=dy3-QZLTpbQ


Anonymous 06/06/2016 (Mon) 06:40:40 [Preview] No. 4737 del
(8.02 KB 214x200 bullshit-gap.jpg)
>>4735

>Edward Snowden is like Evalion: everything they say had already been said by someone else

When and by whom had PRISM been revealed? XKeyscore? MUSCULAR? And with documentation or other direct evidence?


Anonymous 06/06/2016 (Mon) 08:19:36 [Preview] No. 4738 del
(32.40 KB 759x587 coming soon.png)
>>4713
>what is TOR
An Onion routing network protocol. One of many.
>who are its developers?
Someone people that made it happen.
>who is JACOB APPELBAUM
An user that contributed few times, worked 2 years at most as committer, and quit
>What is the TOR project doing about it?
looking for candidates to replace the missing position, now that review of code is complete
>why is /tech/ talking about this still?
'cause e-celeb fags are e-celeb fags.

>>4730
THIS, FUCKING THIIIIIIIIIIIIIIIIS

>>4737
Hey faggot, imagine if EdSnow never even used his name and title to prove what he says has weight?

Wait, you're telling me someone's done something like that now?
What does Panama and water leaks have to do with this?
Wait, deepthroat is some water leaker?
oh wait, ISN'T THIS >>/pol/?!?


Anonymous 06/06/2016 (Mon) 10:11:43 [Preview] No. 4740 del


Anonymous 06/06/2016 (Mon) 10:12:45 [Preview] No. 4741 del
>>4738
>Hey faggot, imagine if EdSnow never even used his name and title to prove what he says has weight?
He'd probably be sitting in some CIA prison camp being tortured right now.
Only because he got his name out there he was able to find "asylum" and escape the three-letter-agencies.


Anonymous 06/06/2016 (Mon) 12:52:00 [Preview] No. 4743 del
so did he actually rape rape anyone and not just "rape"?

seems like people are butthurt about some vague plagarism accusation that they refuse to point out any specifics and they're taking advantage of rape to bully him?


Anonymous 06/06/2016 (Mon) 13:07:35 [Preview] No. 4744 del
>>4730
appelbaum and assange sure

i think snowden is legit. he showed exactly what was being done and how. before him it was all just handwaved as conspiracy theory. since then we've had multiple countries change their laws and the whole internet move towards encryption

>>4740
what does that prove? what did you expect him to say? he's just playing the victim card like an abusive husband would

>>4743
he's a well known asshole and people just got sick of his shit
>inb4 being an asshole isn't a crime
who cares, no one wants him around anymore. it's not like he was a linus or theo, doing actual work while being a bit of a dick, he was just the face of the project and too many people got sick of his


Anonymous 06/06/2016 (Mon) 14:18:22 [Preview] No. 4745 del
>>4744
so did he actually rape rape anyone and not just "rape"?


Anonymous 06/06/2016 (Mon) 14:22:35 [Preview] No. 4746 del
why is the tweet about "making him beg for every meal" gone?


Anonymous 06/06/2016 (Mon) 15:55:21 [Preview] No. 4749 del
(180.37 KB 660x790 -.jpg)
Shit Just Got Real

This is clearly an orchestrated attack to destroy Appelbaum's reputation to get rid of him.

Rumors of the worst kind have been spread on kikenet without any proof

An anon website has been created (jacobappelbaum.net) to further share supposedly 'real' accounts of Appelbaum's 'crimes'. Again without any proof.

The stories published are undoubtedly suspect, everyone can submit anything anonymously.

The main goal of this ruse is to silence Appelbaum which is even stated on jacobappelbaum.net

>we hope that this site will prompt groups and organizations to think twice about any involvement they have with him.

>they shouldn't invite him to speak at or attend their conferences

How about proof?

>I will not believe any allegations until they are proven in a court of law. Why should I?

>Then you will never believe these allegations.

To all of the scum trying to downplay figures like Snowden.

I wish he had given the dox to Wikileaks but non the less his revelations helped us a lot in understanding not only how state actors operate in great detail (involved figures, crimes, location data, broken PPTP,IPSEC,VPN and countless other things, most importantly the NSA's limits (TOR)) but also their incentives.

>>4729
> last month you all hated him for being a sjw and now you guys will defend him to the death against all evidence to the contrary?

There is no evidence and there will never be any.
I will always stand up for those who are about to be silenced.
No matter if SJW, feminazi, nazi, lefty, kike, normie or faglords like you


Anonymous 06/06/2016 (Mon) 16:26:57 [Preview] No. 4750 del
One thing has been bugging me this whole time from the beginning.

what counts as PROOF OF RAPE?


Anonymous 06/06/2016 (Mon) 16:27:13 [Preview] No. 4751 del
it's so clean who is the center of this entire thing..


yactd 06/06/2016 (Mon) 17:13:26 [Preview] No. 4753 del
>>4588
Never forget


Anonymous 06/06/2016 (Mon) 19:09:46 [Preview] No. 4755 del
>>4750
a judges verdict regardless of the evidence

>>4751
time will tell, it is by far not over yet.

Right now Appelbaum is gone while (some of) his accusers are still legit members of the TOR-Project which is not acceptable since the fight against oppression is one of the NGO's central values.

This tension must be resolved soon if they want to keep their face.


Anonymous 06/06/2016 (Mon) 19:36:59 [Preview] No. 4756 del
>>4750

>what counts as PROOF OF RAPE?

In feminazi land? A woman says she was raped. QED.

In US courts? He-said-she-said rape cases are difficult to prosecute, as they should be. If there's not forensic evidence of a violent stranger rape--a rape kit, bruising & tearing--a prosecutor and jury have to go on testimony, which is pretty shaky. Was a woman having a good time in a bar with a guy, but then she got blackout drunk and he dragged her out to his car? Did someone see him mix something into her drink? Stuff like that. Still hard to prove.

I don't know how it is in Yurop, where Appelbaum is now, but I would suspect that their courts fall more toward the "listen and believe" part of the spectrum.

Anyway, all of this is to say that the accusations against him are all feminazi land shit.


Anonymous 06/06/2016 (Mon) 21:15:09 [Preview] No. 4758 del
>>4755
>a judges verdict regardless of the evidence
>having this much faith in the legal system

>>4749
>There is no evidence
witness testimony is a form of evidence

>>4756
>He-said-she-said rape cases are difficult to prosecute, as they should be
i agree with this, but would you accept that this disincentivises reporting by victims since they then have to go through it all in court (including cross examination where a lawyer picks apart your story and tries to prove you're lying) and even then it might not achieve anything


Anonymous 06/06/2016 (Mon) 22:50:14 [Preview] No. 4759 del
(64.05 KB 640x360 468452-rape.jpg)
>>4758

>i agree with this, but would you accept that this disincentivises reporting by victims since they then have to go through it all in court (including cross examination where a lawyer picks apart your story and tries to prove you're lying) and even then it might not achieve anything

I suppose it might, but victims of and witnesses to all kinds of serious crimes testify routinely. Victims of attempted murder, rape, assault, mugging, and witnesses to all of these + murder.

I'd like you to consider whether you've ever expressed concerns about victims of other serious crimes being disincentivized from coming forward because they might have to relive their experiences on the stand. If not, is the issue that you think that rape is just a more traumatic crime than any other, or are women simply so fragile that a different standard should apply to them?

Regardless of your personal thoughts on the issue, I've heard similar sentiments before, and I'm not sympathetic in most cases. Being convicted of a serious crime carries serious consequences, and our adversarial system gives the accused (or his/her counsel) the opportunity to mount a vigorous defense and, yes, that includes cross-examination.

Just to put my cards on the table, I'm also not particularly sympathetic to a lot of putative victims of he-said-she-said rapes. If a woman is attacked on the way to her car by a stranger and raped, I'm totally sympathetic. And, of course, the forensic evidence in those cases is often enough to convict (if they can find the guy, anyway), and cross-examination doesn't play a strong role. Same if a woman is in a situation where she has a reasonable expectation of safety, but her drink gets drugged.

But when a woman gets sloppy drunk of her own volition, and has sex with an equally drunk guy, it's not rape, no matter how much she regrets it in the morning.

There was a court case a few years ago--I think it might have been an important appeals court, not the Supreme Court, though--where the court had to consider whether it was rape if a man and woman had consensual sex, and the woman withdrew consent when the guy was about to blow his load, or how much time he had for it to register and for him to pull out before it became rape. Which is absurd. When the dude you let into your cunny is a couple heartbeats from orgasm, you take your load like a good girl. You don't say "Stop" and then pretend you were traumatized by a few extra thrusts and accuse him of rape


Anonymous 06/07/2016 (Tue) 00:27:07 [Preview] No. 4762 del
>>4741
Like the panama papers leaker and deepthroat?
You have no perspective. You're saying a leaker should flaunt their name and title FOR ASYLUM, when EdSnow used it only for weight. See how beneficial that was for Manning.


Anonymous 06/07/2016 (Tue) 15:19:25 [Preview] No. 4778 del
(268.17 KB 1528x1528 nick_f4rr.jpg)
(135.26 KB 958x879 phoenix.png)
Today's KeKs are brought to you by the

Jacob Appelbaum's Victims Collective


Anonymous 06/07/2016 (Tue) 19:22:27 [Preview] No. 4779 del
(63.12 KB 964x632 sealguffaw.jpg)
>>4778

First

>nonconsensual washing

now

>terroristic spoonfeeding

It. Just. Keeps. Getting. FUNNIER.


Anonymous 06/07/2016 (Tue) 20:15:10 [Preview] No. 4782 del
Cult of the Dead Cow just kiked Jake:


Like much of the hacker community, we were troubled to hear the allegations of sexual abuse, manipulation, and bullying leveled against one of our members, Jacob Appelbaum, A.K.A. ioerror. We*re also aware that the Tor Project is conducting an internal investigation, and encourage anyone with relevant testimony to come forward. For some, it won*t be easy. There can be shaming or humiliation, or the fear of not being believed. It is also our responsibility to create an environment where people feel safe to come forward. We have always stood for freedom of speech and expression, which sometimes necessitates the right to anonymity. This is something that victims of abuse often require. We stand by their right to be anonymous. Others, like our friend Nick Farr, who decided to go public with his own difficulties, deserve our respect and support. Everyone will do this in their own way. We know that it may be scary, but we also encourage victims to contact their appropriate local authorities. We understand the complicated relationship we all have with law enforcement, but there is a time and place for government intervention. If the most extreme of these allegations are true, they should be addressed in a court of law, and dealt with appropriately. CULT OF THE DEAD COW is known for a lot of things, but treating people horribly is not one of them. If communities are to thrive and remain relevant we have to do some housecleaning from time to time. As we have become aware of the anonymous accusations of sexual assault, as well as the stories told by individuals we know and trust, we've decided to remove Jake from the herd effective immediately.

https://archive.is/kGzjn


heh heh 06/08/2016 (Wed) 01:21:29 [Preview] No. 4798 del
>>4782
>cdc
>facebook

heh


Anonymous 06/08/2016 (Wed) 04:40:21 [Preview] No. 4807 del
>He raped me

BOOM

>rip dude

>who would lie about being raped?

This is the blue print to kill off unwanted persons since ever.

kek ... fuck activism and shit

>cyber-terrorism is the future


Anonymous 06/08/2016 (Wed) 14:26:10 [Preview] No. 4831 del
>>4829

here is the pdf

direct link for reference:
https://cryptome.org/2016/06/tor-appelbaum-separation.pdf


Anonymous 06/08/2016 (Wed) 14:38:16 [Preview] No. 4832 del
What does Jacob want from the Tor Project to sue them for?


Anonymous 06/08/2016 (Wed) 16:48:07 [Preview] No. 4833 del
(1.32 MB 1878x1612 01624c24cc6b53.png)
>>4831
Since the pdf consist in just images plus a cover letter, I montage'd the images for convenience

>>4832
You got it awkwardly backwards: what does the Tor project want to hide so much that they allegedly proposed that agreement and allegedly engaged in a smear campaign?


Anonymous 06/08/2016 (Wed) 16:54:55 [Preview] No. 4834 del
>>4833
This is mere conjecture, but the "return of company roperty" is revealing info that the Tor Project wants to conceal and prevent Jacob from releasing it, which is why the Tor Project also threw in the "covenant not to sue". Jacob simply shouldn't sign it and just sue their ass in court.


Anonymous 06/08/2016 (Wed) 16:56:18 [Preview] No. 4835 del
>>4834
*property


Anonymous 06/08/2016 (Wed) 17:10:04 [Preview] No. 4836 del
>>4834
I don't know what "stepped down" means, but I think he signed it. Attractive liberal atheist coders beware, learn from Jacob, don't be a manwhore.


Anonymous 06/08/2016 (Wed) 17:56:57 [Preview] No. 4837 del
>>4834
I think the "return company property" bit is not strange at all. They want Jacob to leave the company and when employees do that they usually have to return stuff (like laptops) the company lent them. No biggie.


Anonymous 06/08/2016 (Wed) 18:00:22 [Preview] No. 4838 del
(21.74 KB 360x480 shari_steele_035_1.jpg)
>>4833

>You got it awkwardly backwards: what does the Tor project want to hide so much that they allegedly proposed that agreement and allegedly engaged in a smear campaign?

I don't think that they want to hide anything. To me this looks like the usual lawyer bullshit.

What bothers me rather is

>>4755

>Right now Appelbaum is gone while (some of) his accusers are still legit members of the TOR-Project which is not acceptable since the fight against oppression is one of the NGO's central values.

>This tension must be resolved soon if they want to keep their face.

As Steele obviously accepts that her employees pull off a smear campaign I think we can conclude that she is part of the conspiracy.


Anonymous 06/08/2016 (Wed) 18:03:08 [Preview] No. 4839 del
>>4836

He declined to sign it


Anonymous 06/08/2016 (Wed) 18:06:41 [Preview] No. 4840 del
>>4834

>This is mere conjecture, but the "return of company roperty" is revealing info that the Tor Project wants to conceal and prevent Jacob from releasing it,

Calm down, m8. It's standard boilerplate. My organization has a similar policy in the employment contract spelling out the return of company property (including data) and even when it takes place (at an "exit meeting" with HR, when you tie up paperwork loose ends).

There's nothing unusual about this agreement.

The interesting bit is that based on the monthly salary they quote, he was making almost $100,000 per annum. That's good money. Especially for flitting about Europe and fingerbanging SJW bitches.


Anonymous 06/08/2016 (Wed) 18:09:44 [Preview] No. 4841 del
(6.80 MB 1920x1080 itsatraphorror.mp4)
>>4838

Yikes. Tranny?


Anonymous 06/08/2016 (Wed) 18:42:37 [Preview] No. 4844 del
(39.56 KB 600x577 abc.jpg)
>>4841

HOPE SO!


Anonymous 06/08/2016 (Wed) 19:19:18 [Preview] No. 4846 del
Dear God, I've read something on the first page of jacobappelbaum.net and the absolutely fallacious logic they use to justify their "fear to be doxxed and harassed" while that's what they are doing (with no substantial proof of "rape" so far) is so frigging childish it makes me sick. "We can't go to the police because they won't believe us, so we smear him to be sure he won't find another job."

I'm not sure I want to use Tor and the TBB any more. This "Tor Project, Inc" is not what it should be. Maybe it's the fate of any 'merican project - it gets fucked up by 'merican inane fashions.

Is i2p any better? I never tried to look too much into it, I feel like there should be more competition in the "not censurable networks" game. And the barycentre should be in yurop, or even russia or china. Hell, even china is better.
Is it feasible to add an i2p address to the to a chan like endchan pretty much as it's possible to add an .onion address?


Anonymous 06/08/2016 (Wed) 19:27:38 [Preview] No. 4847 del
(1.24 MB 500x276 backupman.gif)
>>4846

>Is i2p any better?

I use and like i2p. It's not a replacement for Tor, unfortunately, because it's very darknet-focused. Whereas exit nodes are a big part of the Tor network, enabling users to browse the open internet pretty much normally, the i2p network has very few outproxies (their equivalent of exit nodes).

As a danknet platform, it's great, though.

As for the community and the dev team, it's smaller than Tor's. They were considering a CoC recently, but I don't know if that ever went anywhere.

inb4 our resident Java haters get triggered (again) by the fact that the main i2p implementation is in Java


Anonymous 06/08/2016 (Wed) 19:50:47 [Preview] No. 4848 del
>>4846
>Is it feasible to add an i2p address to the to a chan like endchan pretty much as it's possible to add an .onion address?
Yes, very much so. It's very easy. Maybe someone should make a thread on /operate/ about it?


Anonymous 06/08/2016 (Wed) 19:59:44 [Preview] No. 4849 del
(981.86 KB 335x187 waitingforgnunet.gif)
>This "Tor Project, Inc" is not what it should be.

It never was

>Is i2p any better?
Java

>4848
i support this idea

But I want GNUNET to be ready now


Anonymous 06/08/2016 (Wed) 20:24:16 [Preview] No. 4858 del
>>4847
I see. It should be possible to set up a reverse proxy accepting connections from i2p pretty much as there's a reverse proxy accepting connection from Tor, isn't it?
I've heard that Freenet isn't that secure (because there's allegedly not enough traffic and correlation is easier), is this an issue on i2p? I'm starting researching academic papers on the two

>java
I knew that there was a port in C++ (i2pd) but I don't know if it's "officially recognized", audited and considered secure. I read that it's an "independent third party implementation". I'm not really against java. I've to investigate the differences between implementations I guess

>community smaller than Tor
not necessarily a cons, anyway I see they seem searching for help at very different levels and roles

I've seen that the jacobappelbaum.net domain (besides having obviously a "proxified" whois) is hosted on github directly. Funny, considering that github shuts down projects for "attacking" (verbally) other users (read: using their free speech, often outside of github) or for using "not polite" words. Even that "WebM for retards" project had to be renamed... but it's totally ok to spread groundless rape accusation using their platform, isn't it. It's not defamation and slander if it's not against one of their own special club, rite


Anonymous 06/08/2016 (Wed) 20:30:52 [Preview] No. 4860 del
Neither GNUNet nor Freenet can serve "interactive" websites like chans, only static content, so they're not really an alternative to Tor.
I honestly don't see why we should move off of Tor because of this, though. Even Jacob Appelbaum himself says that he still believes Tor to be secure.


Anonymous 06/08/2016 (Wed) 20:35:05 [Preview] No. 4861 del
https://assets.documentcloud.org/documents/2855004/Tor-Appelbaum-Separation.pdf

Prior to publishing
https://blog.tor
project.org/blog/statement
The Tor Project
requested that Jacob Appelbaum sign the attached separation agreement which
includes a "mutual nondisparagement" clause and an agreement that he will not
sue the Tor Project. After he declined to sign the agreeme
nt, they published their
statement which is a blanket endorsement of any anonymous claims made
against him.


Anonymous 06/08/2016 (Wed) 20:37:24 [Preview] No. 4862 del
>>4750

Semen, blood, marks. Just as with a regular case of violence, seing a doctor imidiatly afterwards is important. They are the evidense collectors in such cases.


Anonymous 06/08/2016 (Wed) 20:42:30 [Preview] No. 4865 del


Anonymous 06/08/2016 (Wed) 20:45:38 [Preview] No. 4866 del
>>4756

Britain, Sweeden and Germany are "good listeners". The other countries need proof instead.


Anonymous 06/08/2016 (Wed) 21:57:33 [Preview] No. 4868 del
>https://medium.com/@oxbloodruffin/public-figures-anonymous-victims-543f0b02d684
>It’s about our community and how it’s changing. In some ways the hacker community reminds me of white-only golf clubs in the 70s. They were mandated to change; then there was a lot of whinging about how the negroes were ruining our club. It’s not a lot different now.
THE
RIDE
NEVER
ENDS


Anonymous 06/08/2016 (Wed) 23:14:36 [Preview] No. 4870 del
NEVER
EVER
ENDS

p.s. why the fuck do they sperg and circlejerk on twitter that much? Shouldn't they use and promote more freedom-respecting, easy to use without javascript alternatives? Or the like? Quitter.se / Twister anyone?
Sure, they wouldn't get all that normalfag visibility... maybe they have chosen their priorities carefully.


Anonymous 06/09/2016 (Thu) 01:11:47 [Preview] No. 4873 del
I'm surprised, I thought he was a faggot.


Anonymous 06/09/2016 (Thu) 01:12:19 [Preview] No. 4874 del
You lay down with dogs, you get up with fleas.


Anonymous 06/09/2016 (Thu) 01:26:59 [Preview] No. 4880 del
>>4868
>>4873
That reminds me of a theory of GamerGate being a proxy war between MGTOWs/gays and SJWs/Communist Jews. If these SJWs take over Tor Project, they're much more likely to be corrupted than gay cryptopunk hackers


Anonymous 06/09/2016 (Thu) 04:03:55 [Preview] No. 4894 del
>>4870

the infosec twitter circle
110% normies seeking for attention

u know, the fags who bring their mac and scarf when giving infosec talks


Leigh Honeywell Anonymous 06/09/2016 (Thu) 15:26:59 [Preview] No. 4919 del
Damn, some really vile shit even bringing up Assange.
https://archive.is/sIE9r

>It was witnessing his uncritical support of Assange and smearing of Assange’s accusers – something I disagree with intensely – that made me understand the true measure of his character.

>uncritical support of Assange

>Believe victims.
They are always right.

>smearing of Assange’s accusers
While smearing herself

2016: Boi she will be mad once she finds out that the woman who the rape allegation is associated to actually announced 2010
>did not want to accuse JA for anything
>it was the police who made up the charges

Honeywell shills for donations
>Disclosure: I’m a volunteer on their advisory board
lmao

>I just want to say that, like Jacob himself, simply talking the talk about consent and sex positivity and “yes means yes” does not make someone a safe person to be around. Watch for people using this technique to groom future victims

The usual bottom line: You are either a feminist or a rapist


Anonymous 06/09/2016 (Thu) 18:23:58 [Preview] No. 4927 del
>>4849
I2P has a C port if i remember correctly.


Anonymous 06/10/2016 (Fri) 04:40:47 [Preview] No. 4937 del
(346.92 KB 1920x1279 wallhaven-306763.jpg)
>>4927

I'm not aware of a C version of I2P, but I'm aware of a C++ version. It's not feature complete, and it has not received the scrutiny that the Java version has.

Plenty of insecure software is written in C and C++, however, so I think the

>Java

maymay is pretty worn out.


Anonymous 06/10/2016 (Fri) 11:58:58 [Preview] No. 4949 del


Anonymous 06/10/2016 (Fri) 12:07:27 [Preview] No. 4951 del
How bad would it be to use a thing like jcgo[1] to convert java to c, and then audit it? Do I2p even compile java directly to machine code, instead of run it on JVM? This would solve many security problems.


[1] http://www.ivmaisoft.com/jcgo/


Anonymous 06/10/2016 (Fri) 15:09:04 [Preview] No. 4952 del
>>4949

>IBM JDK

That's not the Java implementation recommended by the I2P project. It's also not the one most people use.

Thanks for your autistic shitpost, though.

>>4951

lol, you do that. C is magic and secure. And it will deliver freshly baked cupcakes to you every day and give you a blowjob while you audit it which is really easy, which is why complex C programs never have security flaws.


Anonymous 06/10/2016 (Fri) 17:20:45 [Preview] No. 4955 del
>>4952
>C is magic secure
I've never said that. This is a strawman fallacy dude.
My point is that JVM is crazy insecure, and almost every month a new vulnerability is disclosed. I doesn't matter if your code is good and java has garbage collector if your VM leak shit. C has no problem with that, and your system should also protect you against common issues with C, such as buffer overflow.
And, sure, I would love to transcompile the Java code to other language, but there's none better available, except C++ bloat. So, yeah, I would preffer a C code instead of Java bloat.
They could at least compile it to machine code instead of run it on JVM, that would be better for security purposes.


Anonymous 06/10/2016 (Fri) 17:49:15 [Preview] No. 4957 del
>>4951
>How bad would it be to use a thing like jcgo[1] to convert java to c, and then audit it?
Pretty bad. I don't think Java code translated to C would be readable enough to do a proper audit. You'd be more time-efficient just reimplementing it in your more secure language of choice (hint: C isn't the best option for that either because of the human error).
I'd suggest a high-level strict language like Rust or OCaml because performance definitely is a priority here.


Anonymous 06/10/2016 (Fri) 19:02:55 [Preview] No. 4958 del
>Key allegaiton against Tor's @ioerror now denied by the woman herself
https://archive.is/jRNQK
https://archive.is/xeA6G

>>4952

>lol, you do that. C is magic and secure. And it will deliver freshly baked cupcakes to you every day and give you a blowjob while you audit it which is really easy, which is why complex C programs never have security flaws.

Regarding security, I think you didn't get what secure means.

Humans will always fuck it up no matter how simple a language is.

In C you can control the hardware much better than in Java (for example guaranteed cleaning of stack/heap/cpu-registers), your compiled programs can be very small (nice to prevent return2lib for example), no VM, much better tool-chain, predictability.

I could go on forever, but I'm tired and off topic.

C is magic!

>>4957
>C isn't the best option for that either because of the human error
this
>I'd suggest a high-level strict language like Rust or OCaml because performance definitely is a priority here.
I'd suggest C++11/14 too, because it is even safer and faster than those you've mentioned.


Anonymous 06/10/2016 (Fri) 20:14:09 [Preview] No. 4959 del
>>4958

You're missing the point. There's a tendency among of a subset of /tech/ (and 8/tech/) users to idolize C. And I mean that almost literally: it's a tendency that verges on worship, and usually varies in inverse proportion to the person's actual knowledge of C, or programming in general.

You see that when, e.g. anon refers to the thread (yes, a whole thread about it) about a bug in the IBM JVM as some kind of devastating critique of

>Java

I notice nobody makes threads about all of the bugs in the various libc implementations, or gcc, or clang/llvm, etc.

There are solid technical critiques to be made of various Java implementations like all software, but none of the

>hurr Java

fags on this board are capable of making them. So they look for CVEs that have anything to do with Java and post them regardless of their real-world impact and without really understanding them. And when somebody brings up Java software, they piss and moan about how it should be implemented in C, but of course, they can't actually do that themselves :)

It's pathetic.


Anonymous 06/10/2016 (Fri) 22:04:00 [Preview] No. 4961 del
>>4959
Java simply lacks mandatory features (by design) from a security perspective.


Anonymous 06/10/2016 (Fri) 22:11:18 [Preview] No. 4962 del
>>4961
Could you explain a little bit further what you mean by that? I don't really see any security problems in Javas design.


Anonymous 06/10/2016 (Fri) 22:41:08 [Preview] No. 4963 del
>>4962
sry just look it up or make a thread

a little is here
>>4958


Anonymous 06/11/2016 (Sat) 03:54:19 [Preview] No. 4966 del
>>4684
>nadim (the sjw cryptocat nigger) seems to be extremely sadistic about the whole thing and pleasuring himself to all this.

That's because Nadim was called out repeatedly for bullshit he said about the Tor project in other contexts, and interpreted this as "toxic culture from the Tor community" rather than "I incompetently made a dangerous, unusuable crypto product in Javascript that I then promoted to people being targeted by governments, and people properly called me out on it."


Anonymous 06/11/2016 (Sat) 03:58:52 [Preview] No. 4967 del
>>4919
Honeywell made a claim, under her real name, of an actual violation of sexual consent by Appelbaum, regardless of other BS she may have caused, she is an identifiable person making a real accusation of a crime against him.


Anonymous 06/11/2016 (Sat) 09:05:33 [Preview] No. 4970 del
(280.02 KB 1200x1200 1464396403609.jpg)
>>4963

>makes bold claims
>is asked to explain claims
>uh uh uh sorry maybe in another thread wouldn't want to be off topic XD

It's okay, anon. You can admit you're full of shit. You're anonymous here.


Anonymous 06/11/2016 (Sat) 09:09:20 [Preview] No. 4971 del
Java is not Javascript guize XD


Anonymous 06/11/2016 (Sat) 14:13:24 [Preview] No. 4982 del
>>4967

>Honeywell made a claim, under her real name, of an actual violation of sexual consent by Appelbaum, regardless of other BS she may have caused, she is an identifiable person making a real accusation of a crime against him.

Wut? Where did you read that? What crime?


Anonymous 06/11/2016 (Sat) 15:02:05 [Preview] No. 4988 del
(140.31 KB 1200x626 rapist.jpg)
"A rapist lives here", on ioerror house.


Anonymous 06/11/2016 (Sat) 15:35:02 [Preview] No. 4992 del
>>4982
she made a post about it on her blog, if you're having sex and your partner tells you to stop, and you don't, that meets the legal definition of rape inmost places.


Anonymous 06/11/2016 (Sat) 16:21:42 [Preview] No. 4996 del
>>4966
well said


Anonymous 06/11/2016 (Sat) 20:20:41 [Preview] No. 5002 del
(186.19 KB 457x303 impressive.png)
>>5000

checked

>>4992

Are you aren't talkin about this, are you?

>On another occasion where my primary romantic partner at the time, Paul Wouters, was also present, Jacob ignored my use of a safeword when his sexual behavior turned into violent behavior that violated my limits. Paul and I both had to repeatedly tell Jacob to stop, and the experience was profoundly upsetting.

Because that's not rape.
Not listening to a safeword when having BDSM fun (commonly simulated rape) right away is fucking nothing from a legal perspective.

Some people are still not aware that once you are engaged in a sexual act you implicitely consent to a whole range of shit.

For example simply saying "no" and "stop" (the usual safewords) during sex is completely meaningless.

Instead you have to defend against your partner with considerable force so that your intend to stop the act is unmistakenly clear (yelling, screaming, punching, biting, kickin).
No judge who isn't completely retarded would sentence anyone solely because the partner said "no" or a safeword during sex no matter how often. And this is about normal sex, now extrapolate that to BDSM and simulated rape.

If this doesn't make sense to you then you are past sanity and an official feminazi.
In which case you should head back to twitter or tumblr, hugboxes specifically designed just for your kind.


Anonymous 06/12/2016 (Sun) 02:38:07 [Preview] No. 5007 del
>>5002

I've tried to read that blogpost, I really miss the context. It's not really clear what she was was allegedly doing with her cuck of a bf and how she was forced to continue in what she was doing/assisting/partecipating to.
It seems that these Tor SJW can't really interpret what is a "rape" to being with - see >>4958 - so I'd not be too much surprised if she's referring to something wildly different from a cuckolding session


Anonymous 06/12/2016 (Sun) 08:22:27 [Preview] No. 5022 del
>>4958
An unusual amount of C++ shilling lately (specifically claims that it's more secure than rust and ocaml).

https://soylentnews.org/article.pl?sid=16/06/11/0725240

Timing sure looks coincidental. Maybe I'm just paranoid.


Anonymous 06/12/2016 (Sun) 18:43:42 [Preview] No. 5034 del
>>5022

>I'm just paranoid.

ftfy


sage Anonymous 06/12/2016 (Sun) 19:02:17 [Preview] No. 5039 del
>>5022
>MSVC


Anonymous 06/15/2016 (Wed) 20:23:58 [Preview] No. 5174 del
Isis seems to be the "Forest" of the story:

https://twitter.com/isislovecruft/status/743131291093209089

Jacob Appelbaum sexually assaulted me. I'm Forest on http://jacobappelbaum.net [1]. Here's my full story and what's next: https://blog.patternsinthevoid.net/the-forest-for-the-trees.html


Anonymous 06/15/2016 (Wed) 20:54:38 [Preview] No. 5175 del
>>5174
didn't she just move to germany 2 weeks ago? how did applebaum rape her across oceans?


Anonymous 06/16/2016 (Thu) 06:57:34 [Preview] No. 5194 del
(124.99 KB 876x649 1465695912140.jpg)
>>5174

https://archive.is/4lywH

Here's an archive version of her blog post, which you can use if you don't want to be used as a proxy, which she does on her blog without telling you until you get to the bottom of the page O.o

Also, what kind of stupid bitch would get into bed with a guy and not expect to have something in her gash as some point in the night? lol


Anonymous 06/16/2016 (Thu) 07:25:54 [Preview] No. 5195 del
>>5194
The innocent stupid type. C'mon, any health heterosexual men would try to do something... ok, if she said explicitly to not do it, you should stop, but sometimes people don't know what they want and, for some girls, they just need you to step in and start to do something to realize they wanted it since the beggining. So, yeah, I don't consider this "rape".


Anonymous 06/16/2016 (Thu) 07:26:25 [Preview] No. 5196 del
>>5194
The innocent stupid type. C'mon, any health heterosexual men would try to do something... ok, if she said explicitly to not do it, you should stop, but sometimes people don't know what they want and, for some girls, they just need you to step in and start to do something to realize they wanted it since the beggining. So, yeah, I don't consider this "rape".


Anonymous 06/16/2016 (Thu) 16:45:54 [Preview] No. 5204 del


TP~* 06/16/2016 (Thu) 19:16:27 [Preview] No. 5211 del
Perfect smear campgain.

In the same way like Lewinsky + Bill Clinton

The goal is high stigmatization ( he IS not he WAS ).


Anonymous 06/17/2016 (Fri) 13:33:44 [Preview] No. 5250 del
>>5211
wasn't Bill Clinton an ACTUAL rapist though?


Anonymous 06/23/2016 (Thu) 00:47:02 [Preview] No. 5461 del
>>5002
[citation needed]


Anonymous 06/28/2016 (Tue) 21:56:09 [Preview] No. 5603 del
some interesting files from cryptome


Anonymous 06/29/2016 (Wed) 05:56:57 [Preview] No. 5614 del
>>5603
Has anyone done a tl;dr on that horrendous IRC log yet? Its 5 hours of jitterish talk that makes little sense


Anonymous 06/29/2016 (Wed) 17:59:53 [Preview] No. 5650 del
Shit, the chat is crazy
You can't really sum that up

DaveC1 was an undercover (State Dept I guess) CIA agent who had been hired as a project manager.
puffin aka Karen Reilly had known about this but didn't inform the rest of the TOR ppl.


23:10 < ioerror> where is karen in this?
23:10 < mrphs> and I'm sorry karen, but I'd never ever trust you again.
23:10 < helix> karen knew before anyone else
23:10 < mrphs> I was trying to help you however I could. but you betrayed my
trust.
23:10 < mrphs> you betrayed me worse than my enemies and stalkers.


22:38 < DaveC1> We killed a lot of civilians.
22:39 < DaveC1> We tried to minimize it. But that's what happens.


21:46 < DaveC1> helix: That can still be the story. But there's also, and I
don't want to be a dick about this, but some of the anti-vet comments I've
heard and anti-vet hiring policies that people have been advocating make it
sound like "we accidentally hired a vet and fired him as soon as we found out"
and that doesn't feel very good. Or very legal.
21:47 < Runa> not to be a dick, but "we hired someone who we realized would not
be a good fit for this community"
21:49 < DaveC1> Runa: That's a completely legitimate reason and I'll defer to
it. But I would submit that you can't decide whether I'm a good fit for this
community based on my resume any more than you can based on my skin color or
race or gender.
22:23 < ioerror> DaveC1: Why was your first reaction to expressing some
skepticism that bringing US intelligence agents/cleared people on board might
not be so great for Tor's image... to effectively threaten to sue Tor for
discrimination against vetrans?



22:05 < DaveC1> ioerror: Using Tor as a cover like this would be super
illigeal.
22:07 < ioerror> You mean like, XKEYSCORE, the drone proggram that kills
american kids in yemen, the iraq war, FAIRVIEW (NSA domestic spying with AT&T
as a partner) or any other secret US spy program?
22:07 < ioerror> I mean, I can't really take this seriously, I feel like I am
being trolled

22:04 < mrphs> working on internet freedom, might send you to prison in iran,
for a long time. being affiliated with cia, gets you and your family tortured
and murdered before getting a chance to answer any questions.
22:04 < mrphs> I'm sure DaveC1 knows all about that.

22:25 < ioerror> We don't put our users in Iran at risk
22:25 < ioerror> If we hire a CIA person, which we have done apparently, we
will get people murdered
22:25 < mikeperry> right. I think that argument is fair, and valid
22:26 < ioerror> this is the shit i have said for a long many of you have
denied that this was the game we were playing
22:26 < ioerror> I'm really at a loss here.
22:26 < ioerror> DaveC1: Did you do Counter intel at CIA?
22:27 < DaveC1> ioerror: I don't think I am allowed to answer questions about
what I did or didn't do at CIA. Sorry.

22:29 < sekritarma> runa: i trust that dave will work with us to produce a
boingboing article that we help with. i'm not worried there. the question is
how good that article can be for us.
22:29 < mrphs> DaveC1: do you understand that publishing such a thing can
actually cause a lot of serious trouble? I think I made it pretty clear that my
family might get fucking murdered.

The CIA fag just ignores mrphs (again)

22:43 < ioerror> DaveC1: Roger's internship at the NSA is not the same kind of
veteran who helped invade iraq
22:43 < DaveC1> How is it WORSE to have an organization started by an NSA vet
who also has a contractor who used to be CIA.
22:44 < ioerror> Also, check your entitlement? are you kdding?
22:44 < ioerror> Are you aware that for mrphs that his family will be murdered
in iran?
22:44 < ioerror> That isn't a joke
22:44 < ioerror> He has no passport
22:44 < ioerror> He has no ability to work
22:44 < ioerror> He is in exile
22:44 < DaveC1> ioerror: So, um, remember when I was talking about how I heard
things sometimes that kind of sounded like anti-veteran discrimination?



22:30 < mikeperry> I have no doubt that the CIA would find Tor useful, and its
funding would not comrpromise us, but as I said then, the optics would be so
bad that the et improvement to Tor from such funding would not be worth the bad
PR
22:31 < ioerror> mikeperry: Funding does compromise us
22:31 < ioerror> I am clear on that now.
22:31 < ioerror> Tor is compromised.
22:31 < ioerror> When we are paid to work on a browser rather than anonymity
improvements of Tor HS, we are co-opted
22:31 < ioerror> It is a faustian pact
22:32 < ioerror> When we set the road map and found funders to fund us, it was
different
22:32 < ioerror> we haven't done that for a long time
22:32 < ioerror> The money has corrupted us
22:32 < ioerror> And now, we're hoping for influence



22:08 < ioerror> Have you ever killed someone?
22:10 < DaveC1> 5. THat is an incredibly rude question to ask a vet, but no.
Not directly.
22:11 < Runa> what does 'not directly' mean?
22:12 < isis> Runa: i.e. have you ever indirectly killed someone via flushing
shit down the toilet in the US with potable water? we all do things to kill
indirectly, it would be exceptionally difficult to make any accurate guarantee
to the converse.
22:12 < ioerror> isis: yeah, that is bullshit
22:13 < isis> gandi fucking killed a million people indirectly
22:13 < ioerror> isis: when you are part of an imperialist illegal war and
you're in the invasion force as a warrior, you do not get to claim it is like
flushing shit down the toilet
22:13 < ioerror> isis: irrelevant speculation
22:14 < ioerror> isis: in any case, i'm happy to see that my friends in iraq
are an abstract concept to you
22:14 < isis> the deaths in iraq are by no means abstract
22:14 < isis> the concept of "indirectly killing" is
22:19 < isis> ioerror: please, we're all shocked and wondering what is the best
way to move forward, please try - as much as you're angry - not to wantonly
attack DaveC1, but try to remain civil. causing a dramabomb on top of a
clusterfuck is probably not going to help.
22:19 < ioerror> isis: when you compare the iraq war to gandi (the domain
register??!? I suspect you meant Mohandas Gandhi), I can't even believe you are
trying to do that.
22:20 < ioerror> isis: in any case, my questions are not an attack, they are
questions directly related to my interests related to Tor
22:20 < ioerror> If we have a CIA person working at Tor, many of us will be put
in danger
22:21 < ioerror> As it stands now, I have been accused of being CIA and that is
very dangerous
22:21 < ioerror> Once, I was deported from Lebanon for being jewish, which was
because htey said i was a spy for israel (false)
22:21 < ioerror> If we have a CIA person working with Tor, I won't get out of
that next time, I fear
22:22 < ioerror> And I barely did get ou tof that in 2009 (as Sebastian and
others may recall)
22:22 < ioerror> I am still banned for life from Lebanon


TP~* 06/29/2016 (Wed) 18:35:08 [Preview] No. 5651 del
>wasn't Bill Clinton an ACTUAL rapist though?

It was a normal consensual blowjob. All boys + males need it even a president. Who knows it better than me?

Clinton supporter ...


TP~* 06/29/2016 (Wed) 19:17:03 [Preview] No. 5652 del
>DaveC1 was an undercover (State Dept I guess) CIA agent

was

Yes he was.

Edward Snowden WAS an NSA employee - was.

Dave = leaving the CIA
Snowden = leaving NSA
ThePoinT = leaving the international boy porn milieu.

We all know informations "kill" ppl. Their important reputation and hundred things more ...

Never start an archive ( emails,instant messaging). Destroy all that could be abused to end someones life ...

750 GB illegal boy porn erased.

Category: Ultra-Private or Ultra-Rare / USA / US boys / Family Sex


Anonymous 07/01/2016 (Fri) 15:12:07 [Preview] No. 5688 del
>>4588
Please don't post Youtube links here especially not without title.

https://www.youtube.com/watch?v=EXEUE__ap08 is the youngest "State of the Onion" talk from the CCC conference and available here: https://media.ccc.de/v/32c3-7307-state_of_the_onion#video


sage sage 07/05/2016 (Tue) 01:14:50 [Preview] No. 5746 del
>all the [C]ock sucking ITT
>>4958
your compiled programs can be very small (nice to prevent return2lib for example)
what the fuck does this even mean? the only way that sentence can make sense is if you're saying small programs have less stack smashes than big ones. fuck it. i'm done reading shit programmers say on the internet


Anonymous 07/07/2016 (Thu) 23:13:17 [Preview] No. 5782 del
(18.69 KB 548x92 WL.png)
Quite a surprising move

>urras is the dirauth Jake runs. Of course, dirauths must be fully trusted. Recent events (which should be discussed elsewhere) have cast doubt on urras' trustworthiness.

https://archive.is/qBZO4
https://trac.torproject.org/projects/tor/ticket/19271

>>5746
>what the fuck does this even mean? the only way that sentence can make sense is if you're saying small programs have less stack smashes than big ones. fuck it. i'm done reading shit programmers say on the internet

Hello hacker genius. Shitty programmer here.
Fewer subroutines = Fewer targets
>What!? system() is not in the address space?


Anonymous 07/13/2016 (Wed) 18:16:06 [Preview] No. 5841 del
>>5782
I think this was a fairly reasonable move though.
I mean he no longer works for the Tor Project.
Why shoud he still have control over critical infrastructure?


Anonymous 07/20/2016 (Wed) 01:00:35 [Preview] No. 5879 del
>>5841
I got a bad feeling about this
I hate everything and everyone in this debacle but I think Jake might be a good guy like Hitler was, maybe his dirauth was the only one not fully compromised.


Anonymous 07/20/2016 (Wed) 04:21:48 [Preview] No. 5882 del
This is fucked up if true, what do you think?

https://archive.is/UyMmr

>Roger interned at the NSA and his wife has a security clearance and accepted money from DARPA/Pentagon to de-anonymize people. Although it is not considered within Tor that Roger is a risk, he is comfortable with these close links with intelligence power, which is a risk if it is the standard for Tor staff. That the US government is happy for Shari and Roger's spouses to have security clearances is also unsettling.

>It is publicly known that Shari husband worked for the Pentagon (he is quoted in Forbes as previous tech director for DoD). People in Tor say that he worked for the NSA on the XKeyscore mass interception system. He is now officially a VP at Amazon, but it is said he still advises the government.


Anonymous 07/20/2016 (Wed) 04:52:39 [Preview] No. 5883 del
Fork tor and audit it.


Anonymous 07/20/2016 (Wed) 07:58:11 [Preview] No. 5884 del
!!!!!!!!!!!!!

holy MOTHER OF GOD...........

IS TOR COMPROMISED? SHOULD WE EVEN TRUST IT AT ALL??????/

WHAT WILL WE DO????????????????

IS IT SAFE TO USE VPN AFTER TOR??????

OR ARE WE JUST FUKCED!!!!!!!!

GOOD BYE GUYS I'M WIPING EVERYTHING I CAN'T LIVE IN THIS WORLD ANY LONGER

EVERYONE PULL THE PLUG


Anonymous 07/20/2016 (Wed) 15:39:14 [Preview] No. 5888 del
>>5884
Could we please try to stay reasonable ITT, it's a pretty serious subject.

Backups also do exist, do not forget that fact.
- Tox (alpha, buggy)
- I2P (alpha, usable)
- GNUNet (alpha, buggy last year)

There's also Freenet, but nobody likes Freenet.


Anonymous 07/20/2016 (Wed) 19:57:11 [Preview] No. 5890 del
>>5888
>- Tox (alpha, buggy)
What? Tox does not provide any anonimity at all. In fact most privacy conscious people use it over Tor.


Anonymous 07/21/2016 (Thu) 08:30:01 [Preview] No. 5894 del
>>5882
What exactly is Cryptome's opinion on Tor? Do they trust it?


Anonymous 07/21/2016 (Thu) 12:18:27 [Preview] No. 5895 del
>>5890
But I'm pretty sure I read somewhere that they had implimented some form of onion-routing of their own. Something to do with contact discovery? Anyways, I2P support is planned as well (Tor is already supported).


Anonymous 07/21/2016 (Thu) 19:33:05 [Preview] No. 5899 del
>>5894

Who gives a shit? Young is an architect and Natsios is an artist. In what way is either of them qualified to audit Tor?

In terms of their opinion of the project, again, who cares? Y & N have proven themselves to be very flawed people with their own agenda. See e.g. their ignorant criticism of Snowden.

Cryptome does some good work but their opinions don't carry much weight.


Anonymous 07/22/2016 (Fri) 07:12:50 [Preview] No. 5903 del
>>5899
But I don't trust Snowden at all


Anonymous 07/22/2016 (Fri) 07:58:27 [Preview] No. 5904 del
>>5903

That's irrelevant to whether Young and Natsios are qualified to have an informed opinion of Tor.

They are not.

I mentioned Snowden, because they gave an interview in which they made a number of embarrassing statements that highlighted their ignorance about the Snowden docs. I guess when Snowden didn't go to Cryptome first with his cache of documents, their egos got in the way of making an objective assessment of the documents. So they're not reliable.

Cryptome provides a useful service, but their opinions about issues beyond their own operation aren't worth dick.


Tor and Leaked Docs cryptome 07/23/2016 (Sat) 18:48:27 [Preview] No. 5923 del
>>5904
Manning and Snowden and their docs (and Tor) are exemplary although still too limited and tampered with by operators and publishers. It's the strutting gang of self-promoters and motley fans who exploit the courage of others for personal profit and fame. Comsec, infosec and leaks have been corrupted by narcissistic hustlers who could care less about the public while bragging about public service (as taught in professional schools). In too many ways they have adopted the (excuse the vulgar epithets) Donald Trump and Peter Thiel casino model of a few lucky plutiocrats and huge number of certain losers, with the freedom of information game rigged to favor the secretkeeping mansions built by denying untampered material to the public. Worth remembering that even golden haired Assange initially hawked the promise of $5 million to be made by WikiLeaks in first 6 months. Got any idea where that is stashed offshore, cloaked by Wau Holland pretense?


Anonymous 07/23/2016 (Sat) 21:59:50 [Preview] No. 5926 del
>>5923

>roleplaying as the Cryptome people on an anonymous imageboard

Post Natsios' tits or GTFO.


Anonymous 07/24/2016 (Sun) 00:44:59 [Preview] No. 5928 del
tor has been fucked for years
everyone laughed at me for suggesting i2p as an alternative
who's laughing now? :^)


Anonymous 07/27/2016 (Wed) 01:21:06 [Preview] No. 5945 del
>>5928
Are there any cute little girls on i2p, if there are, I'd be there.


Anonymous 07/27/2016 (Wed) 15:30:31 [Preview] No. 5947 del
>>5928
Whynotboth?
I use Tor and i2p.


Anonymous 07/28/2016 (Thu) 18:12:53 [Preview] No. 5967 del
https://blog.torproject.org/blog/
https://archive.is/lkywt

>The investigation is now complete. Many people inside and outside the Tor Project have reported incidents of being humiliated, intimidated, bullied and frightened by Jacob, and several experienced unwanted sexually aggressive behavior from him. Some of those incidents have been shared publicly, and some have not. The investigation also identified two additional people as having engaged in inappropriate conduct, and they are no longer involved with the Tor Project.

Who are the other two (devs)?

>I want to thank all the people who broke the silence around Jacob's behavior. It is because of you that this issue has now been addressed. I am grateful you spoke up, and I acknowledge and appreciate your courage.

The ruse worked very well. Who's next?

>we want to be more clear about (1) how we expect people to behave

code of conduct inc

>I also want to note that the Tor Project board just elected a slate of new board members with significant governance and executive leadership experience. This was a bold and selfless decision by the outgoing board, to whom I am grateful. I am confident the new board will be a key source of support for the Tor Project going forward.

The NSA will gladly support the shit out of you, thanks for the invitation.


Anonymous 07/28/2016 (Thu) 23:16:05 [Preview] No. 5972 del
>>5967
network wide CoC(k)
this is the future you allowed


Anonymous 08/01/2016 (Mon) 08:13:41 [Preview] No. 6006 del
anyone would would be stupid to believe eff/tor/fsf aren't compromised at this stage

stallman and linus both fucking didn't stop systemd for a good reason


Anonymous 08/01/2016 (Mon) 09:49:39 [Preview] No. 6007 del
>>6006

The reasons being that it's a better init system than the alternatives (Linus) and it's Free/Libre Software (rms).

Also, what does Linus have to do with the EFF, Tor, and the FSF?

I eagerly await your publication of the backdoor or other U.S. gov't compromise in Tor and systemd. Seriously. You'll be famous. Get on it. They're both free/open source software. Let us know when you're done with your code audit.

implying you can read or write C or have any idea what you're talking about
lol


Anonymous 08/02/2016 (Tue) 04:48:44 [Preview] No. 6021 del
>I eagerly await your publication of the backdoor or other U.S. gov't compromise in Tor and systemd. Seriously

There are a series of suspect vulns in Tor, TBB and Tails. And quite a bit more that have been fixed by now.

For example dubious and well known bugs in Tails (IP leaks) that haven't been patched in a rather long time like the wget leaks.

Tor-ppl still refuse to properly sandbox userspace in Tails similar to whonix/cubes for no good reasons.

They still refuse to implement routing over two relays instead of just one which enables exit nodes to figure out the guard you are on.

Just too many very strange ties to secret services like CIA and NSA. Also massive cancerous SJW attitude.

Hidden services have always been broken but they refused to acknowledge it for ages.


Anonymous 08/02/2016 (Tue) 06:32:09 [Preview] No. 6023 del
>>6021

>There are a series of suspect vulns in Tor, TBB

[citations needed]

>and Tails.

Tails is not produced by the EFF, FSF, Tor Project, Torvalds, or Stallman. I have no idea why you think it's relevant to our conversation.

>And quite a bit more that have been fixed by now.

Bugs occur in software. They occur more frequently in complex software designed to solve hard problems. If you want to suggest that vulns have been placed in Linux, Tor, or FSF projects under government influence, the burden of proof is upon you.

>For example dubious and well known bugs in Tails

I still have no idea why you're bringing Tails into this.

Apart from your desperation, anyway.


>Tor-ppl still refuse to properly sandbox userspace in Tails similar to whonix/cubes for no good reasons.

Kind of like you keep talking about Tails for no good reason?

>They still refuse to implement routing over two relays instead of just one which enables exit nodes to figure out the guard you are on.

"They" who?

>Just too many very strange ties to secret services like CIA and NSA.

[citations needed]

>Also massive cancerous SJW attitude.

Disgusting, but not evidence of collusion with the U.S. gov't.

>Hidden services have always been broken but they refused to acknowledge it for ages.

The Tor Project admitted that hidden services needed some love (and the new hidden services will be available in 1-2 years, btw), but never to my knowledge admitted that they were "broken". So it's a

[citation needed]

on that claim, too.

I'd ask why it took so long to take down DPR if hidden services are broken, but I'm sure you have some obtuse conspiracy theory for that.

Your claims are ridiculous, so I'm sure you're going to respond with either

>I'm not going to do your research for you!!!!!!

And, of course, you're under no obligation to do so. But, in that case, your claims can be dismissed without further ado.

Or a list of links that do not actually support your claims.

This is because your argument is essentially "The EFF/Tor/FSF/Torvalds/Stallman are compromised af guiz because c'mon guiz they MUST be by now rite? Also, there's bugs in software, and I don't agree with the technical decisions these projects make! Therefore, it's all a CIA/NSA op, bitches, QED!!!!!!"

I'd laugh, but I don't know whether you've had a vasectomy. And the idea that you might reproduce is no laughing matter.


Anonymous 08/07/2016 (Sun) 19:24:24 [Preview] No. 6123 del
>>5650
> 22:31 < ioerror> mikeperry: Funding does compromise us
> 22:31 < ioerror> I am clear on that now.
> 22:31 < ioerror> Tor is compromised.
> 22:31 < ioerror> When we are paid to work on a browser rather than anonymity improvements of Tor HS, we are co-opted
That's so on point it's scary, he may be a faggot but he's right. I honestly can't see this drama as anything but a character assassination of someone competent.


Anonymous 08/08/2016 (Mon) 10:08:49 [Preview] No. 6135 del
>>6007
/* you are a fucking retard */


Anonymous 08/08/2016 (Mon) 10:25:21 [Preview] No. 6136 del
>>6023
This whole post smells very shilly


Anonymous 08/11/2016 (Thu) 14:37:42 [Preview] No. 6184 del
>>6181
>However, another supposed victim now alleges the website that published the accusations wrote down her account against her will, and heavily manipulated it prior to publication. "I am not a victim of Jacob Appelbaum," she told ZEIT. Shortly after its publication, the person responsible for the page had to delete it again. The story is still listed on the page as a "placeholder."

kek


Anonymous 08/12/2016 (Fri) 01:02:00 [Preview] No. 6190 del
>>GOOD BYE GUYS I'M WIPING EVERYTHING I CAN'T LIVE IN THIS WORLD ANY LONGER

We the boy- and girllovers or unfriendly "pedophiles" have one only one important rule as worlds best self protection:

TRUST NO ONE - ABSOLUTELY no one.

If you need 100% security / privacy than SHUT UP.

I explain you why this works.

95% of all children worldwide protect their parents and adult friends. The police know this but never talk about that aka no gold advice for "criminals".

TRUST NO ONE and you can 2016 live in this world ...

TP

PPP: never ever tell someone that you have a wonderful 12 year old girlfriend, 1 million dollar in your house, a boat, soon a dogde viper, or sex with 3 woman each week, a 3000 dollar laptop ...

ppl flip out if they feel your life is perfect


Anonymous 08/14/2016 (Sun) 23:13:23 [Preview] No. 6238 del
(30.93 KB 480x373 CpW-K5dWEAAJNbT.jpg)
Full Zeit.de article: https://archive.is/FjOk0
Surprisingly well researched.

@River's Story

>Die Zeit was able to speak with three of the five guests who were present.

>Tor terminated working with two of those present in July; they were accused of "inappropriate behavior." (>>5967)

>Days later [after the fake rape incident], River posted that she was looking forward to another trip to repeat the fun she had

>>4838
>As Steele obviously accepts that her employees pull off a smear campaign I think we can conclude that she is part of the conspiracy.
100% confirmed by now.

>"Guaranteed, the champagne corks are popping at the NSA," said a Tor staff member.


Anonymous 08/15/2016 (Mon) 02:07:19 [Preview] No. 6239 del
(669.38 KB 900x630 rachel-greenstadt.png)
(15.56 KB 580x77 greenstadt.png)
(5.69 KB 140x186 Bill_Vass.jpg)
>>5882
>>6023
>ties to secret services like CIA and NSA

Roger Dingledine
NSA

Rachel Greenstadt
Dingledong's wife
DoD (https://archive.is/Q9A7A)

Bill Vass
Shari Steele's husband
>Vice President of Engineering at Amazon Web Services (since September 2014)
>was President and Chief Executive Officer of Liquid Robotics
>was the President and Chief Operating Officer of Sun Microsystems Federal (a Sun Microsystems subsidiary focusing on business with government organizations)

>His background has a significant military and government presence, including a stint as an oversight CIO working underneath the Department of Defense's overall CIO. Before that, he was the Chief Technical Officer and Technical Lead for the U.S. Army's personnel systems.

https://en.wikipedia.org/wiki/Bill_Vass

Bruce Schneier
Resilient (IBM Company - aka NSA Partner) - Chief Technology Officer
https://www.resilientsystems.com/

Matt Blaze
Bell Labs
taking part in the ruse operation against Appelbaum

Also read >>5603 >>5650


Anonymous 08/15/2016 (Mon) 02:58:18 [Preview] No. 6240 del
This tor project thing is turning out to be a massive fraud, perpetrated by the US intelligence agencies.

Fork and audit tor. Get these goons out of the picture.


Anonymous 08/15/2016 (Mon) 03:37:23 [Preview] No. 6241 del
FUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCKFUCK


Anonymous 08/15/2016 (Mon) 04:04:02 [Preview] No. 6242 del
>>6239

You've posted a bunch of images and relationships that prove absolutely nothing.

Dingledine's wife uses Apple products? TOR IS COMPROMISED.

She's voting for Hillary Clinton? Like 55% of other voters this coming November? TOR IS COMPROMISED.

The NSA has relationships with big companies which have nothing to do with Tor. TOR IS COMPROMISED.

Bill Vass is a cherub looking motherfucker with a 1970s hairdo? TOR IS COMPROMISED.

Tor is fully open source. If you have evidence of intentional flaws in the source code, post them.

The Tor network structure and routing protocol are not secrets. If you have evidence of intentional flaws in them, post it.

If Tor is a Fed joint, you'll also need to explain why the FBI (and Federal agency) was harassing Lovecruft, and why the NSA's own slides list Tor as part of their "nightmare scenario" for surveillance. You'll need to explain a lot more to be convincing, but that would be a start.


Anonymous 08/15/2016 (Mon) 04:13:57 [Preview] No. 6243 del
TOR may be clean, but the people involved aren't so its time to take a look. Audit it now.


Anonymous 08/15/2016 (Mon) 04:44:17 [Preview] No. 6244 del
What can you tell me about the elliptic curve ed25519?

Are there better curves to use, better algorithms? How strong is the implementation of this algorithm in tor? Can we modify the source to make it stronger?


Anonymous 08/15/2016 (Mon) 04:45:53 [Preview] No. 6245 del
Can we modify the source code to move from 3 hops to 5 hops?


Endwall 08/15/2016 (Mon) 05:00:00 [Preview] No. 6246 del
or.h
#define DEFAULT_ROUTE_LEN 3

change to

#define DEFAULT_ROUTE_LEN 5

Lets try that and recompile


Endwall 08/15/2016 (Mon) 05:12:24 [Preview] No. 6247 del
tor/src/or
routerparse.c

alg = DIGEST_SHA1;

can we change this to

alg = DIGEST_SHA256

?


Endwall 08/15/2016 (Mon) 05:15:17 [Preview] No. 6248 del
control.c

key_type_rsa1024 = "RSA1024";

can we bump this up to RSA 4096 ?


Endwall 08/15/2016 (Mon) 05:20:33 [Preview] No. 6249 del
routerparse.c

digest_algorithm_t alg = DIGEST_SHA1;

change to

digest_algorithm_t alg = DIGEST_SHA256;

I'll try that out, and see if it breaks...


Anonymous 08/15/2016 (Mon) 05:24:46 [Preview] No. 6250 del
>>6246
#define DEFAULT_ROUTE_LEN INT_MAX


Anonymous 08/15/2016 (Mon) 05:29:04 [Preview] No. 6251 del
>>6248
Clients can't enforce those settings.


Endwall 08/15/2016 (Mon) 05:29:40 [Preview] No. 6252 del
>#define DEFAULT_ROUTE_LEN INT_MAX

I think that will make tor never complete a circuit and keep searching for a long time...don't do that.


Anonymous 08/15/2016 (Mon) 05:49:34 [Preview] No. 6253 del
>>6242
>>You've posted a bunch of images and relationships that prove absolutely nothing.
4 Tor-Project leaders having tight relationships to NSA Partners and secret services isn't exactly nothing
>>You'll need to explain a lot more to be convincing
WTH are you even talking about? Convincing? That TOR is broken? >>6239 made no such claim. It just shows that the Tor-Project has been undermined.


Endwall 08/15/2016 (Mon) 05:55:32 [Preview] No. 6254 del
I made the changes, recompiled, and I'm back on the internet with tor_alpha

Works!!

Anymore hacks to do? Post below.


Anonymous 08/15/2016 (Mon) 06:11:29 [Preview] No. 6255 del
>>6254

Neat. Proof?


Endwall 08/15/2016 (Mon) 06:14:45 [Preview] No. 6256 del
>>6255

How should I prove it?
My tor is slightly slower...that's all I can say about it.

Try the hack out and post back here if you get it working. It Just worked for me.


Anonymous 08/15/2016 (Mon) 06:42:22 [Preview] No. 6257 del
>>Tor-ppl still refuse to properly sandbox userspace in Tails

And Tails developer dont support VPN clients or VeraCrypt. Also very suspicious.


>>Bill Vass is a cherub looking motherfucker

he is very handsome

TP


Anonymous 08/15/2016 (Mon) 06:49:45 [Preview] No. 6258 del
>>Are there better curves to use, better algorithms?

Is it not based on OpenSSL?

https://www.openssl.org/docs/manmaster/apps/ciphers.html

If they fully support all cipher suites maybe a downgrade attack work?

TP


Anonymous 08/15/2016 (Mon) 07:08:30 [Preview] No. 6259 del
>>That TOR is broken?

I am a heavy EMET 5.5 user.

EMET told me twice this year shutdown of tor.exe because heavy violations ...

TP


Anonymous 08/15/2016 (Mon) 07:17:20 [Preview] No. 6260 del
https://en.wikipedia.org/wiki/Enhanced_Mitigation_Experience_Toolkit
Microsoft's Enhanced Mitigation Experience Toolkit (EMET) is a freeware security toolkit for Microsoft Windows. It provides a unified interface to enable and fine-tune Windows security features. It can be used as an extra layer of defense against malware attacks, after the firewall and before antivirus software. EMET is targeted mostly at sysadmins but the newest version is supported for any Windows user running Windows Vista with Service Pack 2 and the Microsoft .NET framework 4.5 installed.[1][2] Older versions can be used on Windows XP, but not all features are available.


Endwall 08/15/2016 (Mon) 07:21:45 [Preview] No. 6261 del
I think I might have to change some more variables in circpathbias.c and circuitbuild.c to get this to work properly. I'm not sure that setting DEFAULT_ROUTE_LEN to 5 is enough.

Does anyone know here? It seems to loop and reset cur_len to desired_path_len -1
i circuitbuild.c. Am I missing anything?


Endwall 08/15/2016 (Mon) 07:22:03 [Preview] No. 6262 del
I think I might have to change some more variables in circpathbias.c and circuitbuild.c to get this to work properly. I'm not sure that setting DEFAULT_ROUTE_LEN to 5 is enough.

Does anyone know here? It seems to loop and reset cur_len to desired_path_len -1
i circuitbuild.c. Am I missing anything?


Endwall 08/15/2016 (Mon) 07:25:23 [Preview] No. 6263 del
circuituse.c

else if (build_state && build_state -> desired_path_len >= 4)
cuttof = fourhop_cutoff;

I think this needs to be bumped up to 6


Endwall 08/15/2016 (Mon) 07:25:37 [Preview] No. 6264 del
circuituse.c

else if (build_state && build_state -> desired_path_len >= 4)
cuttof = fourhop_cutoff;

I think this needs to be bumped up to 6


Endwall 08/15/2016 (Mon) 07:43:17 [Preview] No. 6265 del
OK I made the change to:

else if (build_state && build_state -> desired_path_len >= 6)

and recompiled and I'm back on the internet with tor_alpha. Seems to work. I'm not sure if it's doing what I want but those seem like the right variables to hit...


Anonymous 08/15/2016 (Mon) 08:14:14 [Preview] No. 6266 del
>>6242
>JTRIG damage control


Anonymous 08/15/2016 (Mon) 10:21:12 [Preview] No. 6267 del
wow Mr Roger's married to a Jewess
Tor is fucked for sure


Anonymous 08/15/2016 (Mon) 10:24:44 [Preview] No. 6268 del
Why is everyone Jewish in everything


Anonymous 08/16/2016 (Tue) 00:59:56 [Preview] No. 6279 del
>>6266

>JTRIG damage control

Says the guy trying to convince people not to use a technology the NSA has admitted they can't break.

>dun use Tor guiz
>it dun werk bcuz jews
>just use no-log vpn, if they say they dun log ur safe m8!


Anonymous 08/16/2016 (Tue) 01:40:13 [Preview] No. 6281 del
Lucky Green is gone as you probably know.
Now Isis Lovecruft is running his bridge authority.

Wasn't there an official Q&A at Hope11 regarding Appelbaum? Is it on Jewtube? Can't find it.


Anonymous 08/16/2016 (Tue) 11:05:40 [Preview] No. 6287 del
>>6248
What the fuck are you nigger doing? The Tor protocol is defined to use RSA-1024. Stop touching crypto software if you don't have the slightest clue.


Endwall 08/16/2016 (Tue) 11:48:31 [Preview] No. 6294 del
>>6287

Why can't we fork it and make a new tor protocol that runs on RSA-4096 or RSA-2048?

Yeah there is nothing that can be done about it from changing things in the code at a variable level.

I've changed the path length to 5 hops.
And modified some other variables.

Why can't a new tor project emerge that uses a new standared a better one. Uses SHA 256 instead of SHA-1 , uses RSA-4096 instead of RSA-1024, just little improvements like that might make it slightly better... just tweak it a bit.


Anonymous 08/16/2016 (Tue) 12:35:58 [Preview] No. 6300 del
>>6294
"We" can, but if you're going to make breaking changes, make them count, and think about what you are doing. Don't just thoughtlessly change random variables.


Anonymous 08/16/2016 (Tue) 20:24:02 [Preview] No. 6313 del
>>6279
>NSA has admitted they can't break
>believing the enemy

but even if they can't, don't you know that time correlations are serious attack that can't be mitigated without VPN?


Anonymous 08/16/2016 (Tue) 20:45:49 [Preview] No. 6314 del
>>6287

>What the fuck are you nigger doing? The Tor protocol is defined to use RSA-1024. Stop touching crypto software if you don't have the slightest clue.

B-b-but Tor is "compromised", and it's going to take the fine minds of end/tech/ to audit and fix it! LOL

>>6294

>Why can't we fork it and make a new tor protocol that runs on RSA-4096 or RSA-2048?

You can, but good luck getting people to participate in your network. It took the Tor network years to get enough users and relays to be reasonably anonymous and reasonably fast.

Also, if you knew anything (protip: you don't), you'd know that the Tor project is currently working on a new handshake protocol based on NewHope, which is post-quantum secure. RSA-4096 buys you a few years. It will be trivial to break when quantum computers become available. So will elliptic curve crypto.

>>6313

>not being aware that the NSA admitted they can't break Tor in documents they never intended to become public

You should probably get up to speed on the Snowden docs before you keep looking like a moron.

>but even if they can't, don't you know that time correlations are serious attack that can't be mitigated without VPN?

Putting aside the veracity of that statement for a moment, it has what to do with Tor being "compromised"?


Endwall 08/16/2016 (Tue) 21:27:33 [Preview] No. 6317 del
>>6313
> Show me where the problems are in the code it's open source.

Hey how about these things, what do you think about these changes? : )

> YOU ARE DUMB only I can understand the code, protip I am smart and you are dumb.
Trust only the tor project, they are the experts. Look into my eyes, I am the Wizard of Oz, don't look behind the curtain, look into my eyes.

>Also, if you knew anything (protip: you don't).

How about my path length upgrade from 3 to 5 hops, I recompiled it and it seems to be working, any comments about that?


Endwall 08/16/2016 (Tue) 23:42:22 [Preview] No. 6325 del
DeepDotWeb
D.O.J Official Encourages a Hundred Federal Judges to Use Tor
http://deepdot35wvmeyd5.onion/2016/08/16/d-o-j-official-encourages-hundred-federal-judges-use-tor/
Posted by: C. Aliens August 16, 2016

The U.S. government has always appeared to be opposed to Tor due to the nature of illegal activities the software can enable. It appears, though, that certain government officials have no problems vocally endorsing the use of Tor. “That’s not a good way to protect your stuff, because the FBI can go through it like eggshells,” Judge Robert Jenson Bryan says. He disagrees with the DoJ employee’s recommendation. Tor, from the very start, has been intertwined with the U.S. government. Not only did Tor spawn from government researchers but the U.S. has contributed to at least 80% of The Onion Project’s funding for the software. In fact in 2015, Tor opened up crowd-funding to become less reliant on the U.S. government (and of course to allow spending flexibility). In the 1990’s, employees of the United States Naval Research Laboratory created the essence of the Tor we know. Onion routing was developed to protect intelligence data from spying eyes. The Defense Advanced Research Projects Agency picked up the project in the late 90s. After several showcases and an alpha version, the project’s source code was released by the NRL in 2004. The EFF picked up the project and funded the two developers contracted to work on it, Roger Dingledine and Nick Mathewson. Two Boston based programmers contracted by the Pentagon. Government funding became the primary influx of money after 2006. The funding mostly consisted of government funded deals and “pass through” grants. It’s not hard to believe the government completely opposes the software. A perfect example of this is the NSA calling Tor users “extremists.” The connection between the government and Tor being constantly downplayed. However, this isn’t always the case. The director for the Cybercrime Lab at the Department of Justice, Ovie Carroll, told a room full of federal judges to “use the TOR network to protect their personal information on their computers, like work or home computers, against data breaches, and the like,” Judge Robert J. Bryan said in a hearing transcript. Carroll specializes in cyberattacks and combating electronic penetrations. With over 25-years of law enforcement experience, what he says often carries weight. He’s an authoritative presence on the topic at George Washington University as well. Judge Robert Jenson Bryan says “I was surprised to hear him urge the federal judges present,” and continued with “I almost felt like saying, ‘That’s not a good way to protect your stuff, because the FBI can go through it like eggshells.’” Bryan has resided over several cases involving the cybercrime and Tor, including several related to Operation Playpen. One of the most noteworthy is his ruling against the government in evidence obtained by the FBI’s NIT deployment in the US vs. Michaud case. According to data obtained by Motherboard, Judge Bryan is not the only U.S. government official who has endorsed the usage of Tor for privacy. Some of the emails Motherboard was able to access were of a Philadelphia-based FBI computer scientist advocating Tor’s usage to Lebanese officials. Regardless of the way it appears, the U.S. government needs Tor for the purposes the software was designed for. “The United States government can’t simply run an anonymity system for everybody and then use it themselves only. Because then every time a connection came from it people would say, “Oh, it’s another CIA agent.” If those are the only people using the network.” —Roger Dingledine, co-founder of the Tor Network, 2004


Anonymous 08/17/2016 (Wed) 03:41:02 [Preview] No. 6337 del
>"TOR is compromised"
- Jacob Appelbaum

NSA/5-Eyes control the whole Internet. Meanwhile, and I'm confident on that, they can see everything. TOR can't protect you against a global adversary by the TOR-Project's own admission. This is a well established fact. What is written in the Snowden docs (TOR being impossible to crack for the NSA) might no longer be true. Who knows.

Yet there is still no effort going on to implement a proper anonymization technique, one that is also provably effective against a global adversary. Why is that so? If TOR continues on this track it is doomed to eventually break once the NSA becomes powerful enough. This is an important but still unaddressed design flaw in the TOR protocol.

We don't know if TOR is still as effective as it used to be, I wouldn't bet. Snowden docs are old, interpreting them as currently valid facts is insane.


Anonymous 08/17/2016 (Wed) 03:46:55 [Preview] No. 6338 del
>>6325

If the FBI can "go through Tor like eggshells" (whatever that's supposed to mean), why did it take so long to catch DPR?

If the FBI can "go through Tor like eggshells", why do they needs NITs to compromise the anonymity of Tor users?

If the FBI can "go through Tor like eggshells", why can't the NSA?

If the FBI can "go through Tor like eggshells" why did they pay $1,000,000 to Carnegie Mellon to mount a new kind of attack? The attack has since been mitigated.

Lots of judges are ignorant about tech. This one certainly appears to be. The fact that he has presided over some cybercrime cases does not make him an expert on Tor.

Was there some point to your wall of text?


Anonymous 08/17/2016 (Wed) 03:49:49 [Preview] No. 6340 del
>>6337

>"TOR is compromised" - Jacob Appelbaum

Nice job taking the quote out of context.


Anonymous 08/17/2016 (Wed) 03:59:19 [Preview] No. 6341 del
>>6338
>Lots of judges are ignorant about tech. This one certainly appears to be. The fact that he has presided over some cybercrime cases does not make him an expert on Tor.

The fact that he has reviewed evidence collected by the FBI, both admissible and inadmissable, suggests he might know something important about what the FBI can and cannot collect, and what methods they use, and how it is done.

I think tor is a good tool, I use it in many of my endware programs. I don't think its invincible, and I do believe that there are working realtime attacks against it that can deanonymize users.


Anonymous 08/17/2016 (Wed) 04:03:02 [Preview] No. 6342 del
>>6340
The point is the project doesn't focus on the most important things like how to establish anonymity in the light of a global adversary.

Guess why.


Anonymous 08/18/2016 (Thu) 18:34:33 [Preview] No. 6370 del
David W. Robinson
>As a Tor volunteer and contributor, I feel at
>risk not only from the Seattle Police Department, but now also from Tor
>Project members who are targeting a growing list of individuals for
>shunning and character assassination with no apparent push-back from
>management — indeed, with management’s collusion.
https://archive.is/gqkmo

marie/shiro
https://archive.is/2meP

Analysis of current events.
>The Weaponising of Social Part One: The Crucifixion of IOError
https://archive.is/dTug9
>The Weaponising of Social Part Two: Stomping On IOError’s Grave
https://archive.is/5UuZO
>The Weaponising Of Social Part 3: The Resurrection Of IOError
>Begins with a short TL;DR of the whole story (all parts)
https://archive.is/JdiZC


Anonymous 08/18/2016 (Thu) 20:19:00 [Preview] No. 6373 del
>>6242
>Tor is fully open source. If you have evidence of intentional flaws in the source code, post them.

The days someone stood up against CIA agents trying to infiltrate TOR are counted. People are already getting replaced. Three members of the current board participated in the smear against appelbaum. Another one works for IBM. None of them spoke out against TOR-Project members abandoning all ethics. Shari is corrupt and was part of the game right from the beginning. The members who orchestrated the attack against Appelbaum and friends succeeded thus far and gained more control over the infrastructure. Now they also decide who stays and who doesn't, prevent potential new Appelbaums.

The NSA just couldn't break TOR from the outside. They needed to undermine the infrastructure.

Dave Chasteen was probably just one of many tries. But they hit a wall of people like Appelbaum. So they happened to get rid of them. Look at the people in charge now.

>flaws in the source code
lel, you naive motherfucker


Anonymous 08/18/2016 (Thu) 21:29:27 [Preview] No. 6375 del
>>6373

>The days someone stood up against CIA agents trying to infiltrate TOR are counted.

It's Tor, not TOR. I don't even know what you're trying to say here. Learn English, then try again.

>The NSA just couldn't break TOR from the outside. They needed to undermine the infrastructure.

Explain how they are undermining the network infrastruture.

Also, they're undermining Tor another way, by sending their bots to crawl the internet and sow FUD about Tor so people don't use it.

You know, kind of like you're doing.

>Dave Chasteen was probably just one of many tries.

You mean the former CIA agent? I suppose you have some evidence that he was still working on behalf of the CIA?

Of course you don't.

>flaws in the source code
>lel, you naive motherfucker

That's your admission, of course, that you can't find any. Even assuming you can read and understand code.

See, the thing is, the Tor software and network are designed to frustrate malicious actors. Most relays and bridges are run by volunteers outside of the Tor project. You have provided nothing but speculation and gossip about organizational drama at the Tor Project. Even a malicious actor at the Tor Project cannot magically, through malice alone, deanonymize Tor users.

Make an argument with real evidence. Refer to the source code. Post Wireshark logs, leaked memos from inside the project, an argument about structural flaws in the Tor network. Anything but your inane bullshit.


Anonymous 08/18/2016 (Thu) 22:19:17 [Preview] No. 6376 del
>>6375
>Explain how they are undermining the network infrastruture.
>I suppose you have some evidence that he was still working on behalf of the CIA?

uh...


Anonymous 08/19/2016 (Fri) 17:39:39 [Preview] No. 6393 del
>>6376

>uh...

While I'm sure that's the noise you make when your boyfriend pounds your prostate just right, it's not an argument, or evidence, or in any way relevant here.

Post evidence that changes have been made to the Tor network infrastructure that compromise the anonymity or security of users.

Post evidence that Chasteen was still working for the CIA when he started his employment for the Tor project.


Anonymous 08/21/2016 (Sun) 07:52:13 [Preview] No. 6420 del
the fact that lucky is pull out his node is enough of a redflag


Anonymous 08/21/2016 (Sun) 15:12:24 [Preview] No. 6428 del
(141.86 KB 850x569 1106348771522.jpg)
>>6375
>There is nothing wrong with centralized networks
>Trusting the CIA


Anonymous 08/22/2016 (Mon) 22:42:26 [Preview] No. 6441 del
>>6375
>I don't even know what you're trying to say here.
Maybe you should learn English, the sentence is fine.

>there is no proof that he's still working for the CIA so you should trust that he didn't
Nigger, this isn't your high school debate club and neither is it a court of law, even if you'd like to pretend otherwise. Tor isn't trustworthy if it employs those who worked for its "enemies". This is all that matters, trust.


Anonymous 08/24/2016 (Wed) 16:59:05 [Preview] No. 6506 del
>>6441

>Maybe you should learn English, the sentence is fine.

It may be grammatically correct, but it makes no sense.

>there is no proof that he's still working for the CIA so you should trust that he didn't
>Nigger, this isn't your high school debate club and neither is it a court of law, even if you'd like to pretend otherwise. Tor isn't trustworthy if it employs those who worked for its "enemies". This is all that matters, trust.

You're doing a sloppy job of moving the goalposts.

Just admit that you have an opinion that's based on a gut feeling instead of facts and reason. It's fine. You can't expect anyone to take you seriously, but you're entitled to hold your own retarded opinions.

The Tor project hired (and then fired) a guy who worked for the CIA in the past -> Tor is compromised. That's your total argument. If you want to discourage the use of a technology because of this "contamination by association", you should also stop using AES, which means not using https anymore (unless you restrict your browser to using Camellia). NIST/NSA selected Rijndael for AES. Therefore AES is contaminated.

You really need to stop using the internet altogether, though. You know it was funded by DARPA, right? Therefore, the internet is contaminated.


Anonymous 08/24/2016 (Wed) 20:17:57 [Preview] No. 6510 del
>6506
>NIST/NSA selected Rijndael for AES

Well, you can use AES without asking the NSA to generate a key for you.

But you can't route through Tor without asking a dir auth for a map.
This central authority shit is already compromised by design.

You can trust code but not people.


Anonymous 08/25/2016 (Thu) 00:39:37 [Preview] No. 6513 del
>But you can't route through Tor without asking a dir auth for a map. This central authority shit is already compromised by design.

How do we know that some rouge dir auths aren't logging the paths?


Anonymous 08/25/2016 (Thu) 00:41:52 [Preview] No. 6514 del
Why can't path selections be made randomely by the client? How hard would this be to fix?


Anonymous 08/25/2016 (Thu) 14:51:44 [Preview] No. 6522 del
>>6514
>Why can't path selections be made randomely by the client

The hard part is automatic detection and exclusion of malicious servers. Which as of now is more or less done (semi) manually. Gnunet.org researches this topic heavily, check their publications. For a general introduction see https://en.wikipedia.org/wiki/Consensus_%28computer_science%29

Making directory authorities available to be hosted by everyone is a two edged sword of course. It would inevitably open up an array of attack vectors. Another much safer approach would be to get rid of this service as a whole and use a p2p network discovery algorithm like I2P is doing. Downside is that such algos typically take fucking forever to map out a network.


Anonymous 08/25/2016 (Thu) 18:50:11 [Preview] No. 6524 del
>>6514
Path selection is done locally. A directory authority basically gives you a list of nodes to choose from. You have to trust it.


Anonymous 08/28/2016 (Sun) 18:46:54 [Preview] No. 6564 del
>>6506
> The Tor project hired (and then fired) a guy who worked for the CIA in the past -> Tor is compromised. That's your total argument.
Neither my argument nor the argument of the guy you originally replied to. Nice off-topic rant though, must have felt great writing it.

Seriously, try basic reading comprehension again, it will help.


Anonymous 08/31/2016 (Wed) 02:35:33 [Preview] No. 6585 del
Tor project Gitweb
http://jqs44zhtxl2uo6gk.onion/
https://gitweb.torproject.org/

Search and post Jacob Appelbaum commits of interest.


Anonymous 08/31/2016 (Wed) 02:44:29 [Preview] No. 6586 del
https://gitweb.torproject.org/ioerror/tor.git/

5,6 years old... no commits in a long time.


Endwall 08/31/2016 (Wed) 02:53:21 [Preview] No. 6587 del
Hey this looks interesting. torwall.

http://jqs44zhtxl2uo6gk.onion/ioerror/torwall.git/
https://gitweb.torproject.org/ioerror/torwall.git/

https://gitweb.torproject.org/ioerror/torwall.git/commit/?id=dadc57cb3c1f3fe562aa592afd821a57cfefcb91

diff --git a/TODO b/TODO
new file mode 100644
index 0000000..1eb6e00
--- /dev/null
+++ b/TODO
@@ -0,0 +1,3 @@
+Write a proper firewall ruleset
+Finish the firewall script loader
+Add support for gtksu or something similar for launching the firewall script loader

Doesn't look like this project got finished...

Maybe Jake can write a GTK interface for endwall.sh ...


Anonymous 08/31/2016 (Wed) 18:27:35 [Preview] No. 6589 del
>>6587

>Maybe Jake can write a GTK interface for endwall.sh ...

Or add stuff to your TODO. Niggas got addin stuff to TODOs on lock, nigga.


Anonymous 09/11/2016 (Sun) 13:38:30 [Preview] No. 6699 del
>>6694
archive.is i aint clicking that shit nigger


Anonymous 09/12/2016 (Mon) 12:28:54 [Preview] No. 6711 del
>>6694
>archive.is meme

let's centralize all links to 1 website so we can data mine ALL links posted on chans


Anonymous 09/12/2016 (Mon) 12:47:18 [Preview] No. 6712 del
(334.02 KB 982x3268 yawnbox.png)
>>6694
>>6699

It's an account from a person who was in Jacob Appelbaum's apartment when he raped "River".

He's friends with Jake so it's very biased.


Anonymous 02/22/2017 (Wed) 22:14:43 [Preview] No. 8082 del
bumperino



Top | Return | Catalog | Post a reply