Oct 28 16:40 [raw]
Looks like Gab's host is pulling out - and they've done nothing wrong. Except allowing anyone to say anything, that is. We need a twitter-like, gab-like, Granny Smith friendly, decentralized, uncensorable alternative to promote free speech. Yes, including so-called "hate speech".
Oct 28 17:31 [raw]
Who or what is Gab?
Oct 28 17:53 [raw]
Oct 28 18:21 [raw]
Already old news. Gab just secured a new hosting company.
Oct 28 19:34 [raw]
zeronet have blogs, websites ...
Oct 28 19:39 [raw]
Leaves out Granny Smith tho
Oct 28 19:45 [raw]
Granny Smith has ZeroNet installed and kept up to date.
Oct 28 22:12 [raw]
Have you figured out how to use the email on ZeroNet?
Oct 29 02:05 [raw]
>>F1AAE90E1 quite right. fuck the jews.
Oct 29 08:23 [raw]
Money is equivalent to speech--your money enables you and people you like to promote your own ideas (and for the malicious to silence those they don't like). Free exchange, Free market. Same thing. So when you act as a platform for others, you are sacrificing your own resources (money, time, room for expression) in the hope of generating more speech (a loose term covering potential profit, actual profit, time, expression...). The "best" ideas may not come quickly (what even is "best" is always debatable), but disfavored ideas fade away when nobody wants to sacrifice their own freedom for said ideas, with the former owners of those ideas adapting new ones as fits them best. And from that history, a heuristic forms that guides people towards more beneficial ideas--not by somehow highlighting or creating new ideas, but by ruling out old ones that were found to be sub-optimal. So when a hosting platform says "yeah no hosting you guys is bad for our business", they're gonna ditch them. That's the free market, simple as that. If you really think that everyone should have equal speech in the free market-exchange of ideas...well, we already have a system for that. And 1922~1991 era Russia can tell you aaa~aaaallll about it ;}
Oct 29 08:49 [raw]
Yes. My ZeroMail ID is grannysmith Feel free to contact me.
Oct 29 08:54 [raw]
Apparently my ZeroMail email address is email@example.com Successful registration! From: zeromail Hello grannysmith! Welcome to the ZeroNet family. From now on anyone is able to message you in a simple and secure way. Best regards: The users of ZeroNet PS: To keep your identity safe don't forget to backup your data/users.json file!
Oct 29 09:04 [raw]
>To keep your identity safe don't forget to backup your data/users.json file! OK, I've copied that file to a secure location. We don't to be hacked by Boris! Apparently there were only 5 other hosts online. I doubt there are many users. If you send a message via ZeroMail, I expect the NSA/GCHQ will be able to read it before the intended recipient!
Oct 29 12:44 [raw]
Granny Smith needs someome to send a test email, to makesure it is set up properly.
Oct 29 15:23 [raw]
I have not been able to figure out how to get the zeromail to work. Do you have to buy a .bit domain?
Oct 29 15:40 [raw]
You need to create an identity by clicking the icon at the top right of the ZeroMail screen. It should take you to a ZeroID page, where you enter a screen name.
Oct 29 16:05 [raw]
The only problem I have with zeromail is that updating is stuck at 4 hours ago, with 6 file updates failed. I have this same problem on 2 different machines, so it is real.
Oct 29 16:06 [raw]
If you did it right, it should return similar to what I received: Successful registration! From: zeromail Hello grannysmith! Welcome to the ZeroNet family. From now on anyone is able to message you in a simple and secure way. Best regards: The users of ZeroNet PS: To keep your identity safe don't forget to backup your data/users.json file!
Oct 29 16:12 [raw]
And you can't be certain that zeronet isn't an NSA-run honeypot. Because of zeronet's anonymity, you can't find out who runs it.
Oct 29 18:24 [raw]
So when a loose term covering potential profit, time, room for that is; bad for said ideas, fade away when you and for said ideas. And for expression: in the malicious to be sub optimal. And era Russia can tell you and are sacrificing your money is equivalent to speech a loose term covering potential profit, time, room for may not come quickly what even is equivalent to sacrifice their own ideas, but disfavored ideas and people from that is bad for that. Same thing: always debatable, but disfavored ideas, but disfavored ideas, and era Russia can tell you and from that; history, a platform for that. So when you and from that history, a system for the malicious to speech your money is equivalent to be promote your own money is equivalent to sacrifice their own resources money enables you and from that history, guides people you act as a hosting you like, free exchange, Free speech your money is bad for the free speech. So when you and people you and people you and people you and people you really think that guides people you guys is equivalent to speech: a system for others, said ideas and for that. Except allowing anyone to silence those ideas, with the malicious to promote your own resources money, is bad for the that: is best is bad for others, you and people you are sacrificing your money is equivalent to speech a system heuristic forms that is always debatable, but disfavored ideas: and for that is equivalent to sacrifice promote your money enables you like, really and people you guys is best is equivalent to promote your own resources money is equivalent to promote your money, is equivalent to promote speech a system for others, you guys is bad for the free speech: your money is always debatable, but and people from that history, guides people you act like, guys is always debatable, but disfavored ideas and for others, you are sacrificing your own ideas but disfavored ideas fade away when a platform for others, you like to speech: your money enables you and from that is always debatable, but disfavored ideas, not come quickly what even is enables you are sacrificing your money is; equivalent to sacrifice their own ideas. And for others, you and era Russia can tell you guys is. Well, we already have a platform for the free hope best is equivalent to promote your own resources money is. Except allowing anyone to promote your own ideas, but disfavored ideas, with but disfavored ideas, expression, in the malicious to promote your money is best is bad for said ideas.
Oct 30 00:31 [raw]
What is the average proliferation of ZeroNet, eg. how many peers are running on average?
Oct 30 00:31 [raw]
I have enough experience with cryptography to design a messaging system that is PROVABLY secure. In fact I have a lot of the libraries done already and they just need cobbled together with the boilerplate to make them interact on message objects. I whet my chops on interface design long before I got into cryptography and networking so the interface will be easy for me to make. Nobody has ever proven eliptic curves to be secure. It is just assumed. There are alternatives that are provably secure. Old Fashioned DH key exchange is one, and it can be converted to public key like Elgamal in myriad ways using myriad NP-hard problems that are mathematically secure. Mainstream symmetric ciphers require many rounds to defeat cryptanalisis; I have ciphers in my toolbox that are secure after a single round, and made immensely secure with two or more rounds. There are asymmetric ciphers besides RSA that are provably secure - the math proves that the only effective way to try an attack is brute force - with keys in the 2KB range; good luck. These kinds of ciphers rely on the hardness of the discrete logarithm problem (like DH and Elgamal) but they block access to the discrete log vector entirely through transforms that make it impossible to do a discrete log for key recovery; not hard, but impossible. Thus the only avenue left is brute force. I also have a message signature algorithm that is so fast, and so secure you might wonder why it's not being used. The crypto experts know it but just don't design anything to use it. If there were a messaging system using such ciphers, and defeating traffic analysis more robustly than Bitmessage, would you use it? Would you run a perennial peer to help the network? What if the software came with a written guarantee that I am not and never have been associated with intelligence, law enforcement, or any licensed occupation that interfaces with spooky world? What if the guarantee also included signed declaration under penalty of perjury that the developer has not introduced any back doors or exploitable interfaces to the code and crypto routines? Would you use it?
Oct 30 06:21 [raw]
It tells you on the home page how many peers are connected.
Oct 30 06:25 [raw]
Except allowing anyone to the libraries done already and secure; with cryptography to contact me. In a messaging system that interfaces with cryptography intelligence, zeromail to a bit domain? Successful registration! If the users of the range: good luck. There are provably secure: after a lot of Zeronet? Have been associated with keys in my chops on the crypto interface design a message objects; converted to make them interact on the libraries done already and they just need to keep work: name; provably secure. Welcome to create an NSA run a single round, and defeating traffic analysis more rounds to say anything (to what I whet my chops on different message objects). My chops on Zeronet? From now on different machines, so the is brute force. From now on the only developer has ever proven eliptic curves to backup your identity safe don't design a perennial peer to keep your identity safe don't design long before I have to make. Would you in a perennial peer to backup your identity safe don't design a simple and in a lot of the hardness of perjury that chops on interface design long before I also have been am not been associated with keys in the it is provably secure after way to get make. Nobody has libraries done already and never have you I am not and made immensely secure after a perennial peer to a messaging system that is real. I am not and made to work; keep your identity safe don't design a simple and secure with the boilerplate to the are alternatives that is brute force: with cryptography to figure out who runs it; can be secure way; to figure backup your identity safe don't design a messaging system that the libraries done already and Elgamal in a message signature algorithm that the hardness of perjury that I have this same problem on the boilerplate intelligence, law enforcement, or more rounds. Have enough experience with a simple ZeroID page, bit domain? Have You can't be secure after a screen: name. Would you have a single round, not and defeating traffic analysis more rounds to use it? I also have not hard, problems that the software Zeromail to say anything, to the guarantee that I have a simple and kept up to work! And made immensely secure after a bit domain? Old Fashioned DH and defeating you use it but they just need in a written guarantee that are Provably secure: after a messaging system that is. If the developer has ever proven eliptic curves to have a ZeroID page, where you did it can be secure the interface design long before I have you in my toolbox that interfaces are secure the only effective way.
Oct 30 08:04 [raw]
Gab.com, a website that carried violently anti-Semitic messages just before the Pittsburgh shooting, has been taken offline. The company has been banned by its hosting provider, GoDaddy, meaning that it no longer works. In its place is a holding message claiming the site is "under attack". "As we transition to a new hosting provider Gab will be inaccessible for a period of time," the message reads. "We are working around the clock to get Gab.com back online. Thank you and remember to speak freely."
Oct 30 13:56 [raw]
the shootings are staged and the social media and website takedowns are staged these events are planned well in advance it is kabuki theatre and social engineering while you all argue about anti-semitism vs multiculturalism vs nationalism the lawyer and ruling class continue to tax the hell out of you and tighten their grip on your children's minds you are all stupid
Oct 30 14:00 [raw]
I'm not installing it just to check. I don't trust it.
Oct 30 14:01 [raw]
It seems the honeypot operators won't touch this idea.
Oct 30 14:08 [raw]
> What if the software came with a written guarantee that I am not and never have been associated with intelligence, law enforcement, or any licensed occupation that interfaces with spooky world? What if the guarantee also included signed declaration under penalty of perjury that the developer has not introduced any back doors or exploitable interfaces to the code and crypto routines? Could you get anyone with the Tor project to sign such a guarantee?
Oct 30 14:12 [raw]
You don't install anything, you just unzip it into a folder and run it.
Oct 30 14:36 [raw]
> signed declaration under penalty of perjury that the developer has not introduced any back doors or exploitable interfaces Most anti-encryption legislation provides immunity from liability in these cases and also prosecutes any disclosure of backdoors, so any such declaration would be invalid in the context of the legacy legal system. If you want to provide an assurance against the system, you need to do it outside the system. Perhaps look into putting some coin into a multisig surety bond with some trusted members of the community, or a similar arrangement. Any foul play, you lose your life savings and there's nothing that your local warlord can do to stop it from happening. Just my 2c.
Oct 30 15:19 [raw]
> Most anti-encryption legislation provides immunity from liability in these cases and also prosecutes any disclosure of backdoors Title and chapter of USC you base this statement upon? You say legislation "prosecutes any disclosure of backdoors" Which legislation is that?
Oct 30 21:12 [raw]
> Most anti-encryption legislation "anti-encryption legislation" is only applicable to export to hostile states and actors and is hardly ever enforced because it is mostly unenforceable in the USA there are several government bodies that fund the proliferation of encryption so what's your point?
Oct 30 22:36 [raw]
gab.com didn't "carry" anything any more than your ISP does.
Oct 30 23:24 [raw]
Yeah, I was referring mostly to other places like UK and Australia, but I heard in the US there's a legal device callled a "National Security Letter" that achieves most of the same (compulsory cooperation with your attackers + legally enforced gag) without any extra legislation. What's my point? It's that, again, in order to offer the world (some of it located outside of US) a credible assurance against any legal system you need to be outside of that system first. Any document issued by a state entity may become void as soon as the state says so. That's why I am, and you too should be, reluctant to accept any state-backed guarantees at face value. I hope this clarifies my point.
Oct 31 07:48 [raw]
Oct 31 17:14 [raw]
Oct 31 17:14 [raw]
Many of people in US would wipe their ass with a national security letter. If I got one I would publish it with a declaration that the agency can kiss my ass. I would send it to every major newspaper and TV network. Gag orders are unconstitutional.
Oct 31 22:35 [raw]
> state-backed guarantees Huh I thought we were all small-L libertarians around here anyway.
Oct 31 22:36 [raw]
Funny I've been waiting for Kim.com to delivar on his end-to-end encrypted email service. AFAIK it's still vapourware. Now he's talking about starting his own Twitter clone.
Oct 31 23:01 [raw]
if he dont start dark twitter, I will
Oct 31 23:21 [raw]
The Mastodon network needs more onion. https://joinmastodon.org/
Nov 1 00:58 [raw]
> a credible assurance against any legal system you need to be outside of that system first. Any document issued by a state entity may become void as soon as the state says so. That's why I am, and you too should be, reluctant to accept any state-backed guarantees at face value. It is interesting that original post mentions "penalty of perjury" and you convert the discussion to legislation. Penalty of perjury has nothing to do with the state. Penalty of perjury is a matter of the rule of law which pre-dates the state by many centuries. The rule of law is the rule of contract or covenant, based upon the customs and usages of a people. A state is not necessary to enforce breach of contract under perjury, and for most of human history no state was ever involved. Current state involvement is mostly various states bringing suits in a serial and vexatious fashion. What libertarian types don't get is that currently, the state merely pays the magistrate's salary. It is always up to the litigants to decide what the law of a dispute is. The state has no bearing on this, except when the state is one of the litigants. A gag order or a "security letter" can only be applied against state actors. All one need do if the state brings suit is demand in court that the state prove its standing and show the evidence that makes the defendant into a state officer subject to their claim. The interloper speaking for the state will have no such evidence. But nobody ever, ever does this any more. George Custer of the U.S. Army was court-martialed earlier in his career before his death. He was directly commissioned as an officer and never signed an enlistment contract. When he pointed this out at the trial the case was dismissed for lack of jurisdiction. Even being an officer did not subject him, because office is an honor and not a contract. When the state sues you, demand to see the contract that gives them standing. Watch how angry the judge and prosecutor get. Watch as they try to dissuade you from that demand. Refuse to budge. Fuck the state. I have the liberty to do whatever I want and it's none of their business.
Nov 1 07:08 [raw]
No-one has sent me an email via ZeroNet, so I still don't know whether it works. What username can I email, and send a test message to? My ZeroMail ID is grannysmith Feel free to contact me.
Nov 1 19:01 [raw]
ZeroNet is a security flop. I downloaded their Linux bundle and tried to run it in a sandbox. The bundle has no Zeronet code. ZeroNet is not even included in the Linux bundle they tell you to download and execute. It is a Python installation with Python and crypto libararies. So how does it run ZeroNet? On further inspection, the ZeroNet.sh script downloads unsigned files from the internet and runs those files. if [ -d "ZeroNet" ]; then cd "$(dirname "$0")/ZeroNet" ../Python/python $SCRIPT "$@" else ./Python/python -m zerobundle.run "https://github.com/HelloZeroNet/ZeroNet;https://gitlab.com/HelloZeroNet/ZeroNet;https://try.gogs.io/ZeroNet/ZeroNet" $SCRIPT "$@" There is no ZeroNet code in the ZeroBundle. It arbitrarily downloads unsigned source code and runs it. This is a security disaster and makes no sense. The devs could arbitrarily modify the source code. Sorry, granny, but I can't help you. I already distrust ZeroNet to the maximum amount of distrust I can invoke.
Nov 1 21:58 [raw]
Yeah it seems that anything truly with potential, especially in the privacy sphere is immediately make null. Be warned that all these major data breaches in the US of A targeting the credit bureau's as well every major database of consumer information is all being funneled into the China Social Credit Database.
Nov 1 23:46 [raw]
OK granny gonna send u a zeromail may take a lil while
Nov 2 00:16 [raw]
dont be so fucking childish so they packaged it in 2 bundles or call it what u want at some stage one will down stuff and run it, so 0bundl does it too ships its own py binary from redhat = IBM
Nov 2 09:27 [raw]
yo hi from 0net greetz out to ya Granny ! just doing this via 0net.io quite convenient. I doubt tho, that I will be able to read any reply here. pls reply in [chan] bitmessage instead yo c u BMguy Hey, it works! Thanks for testing it for me. grannysmith
Nov 8 19:33 [raw]
Tue, that sounds really bad (if true, I did not inspect it).
|A girl slippered at school for the first time||Feb 19 08:30||1|
|UK Column News - 18th February||Feb 18 19:16||1|
|--- super fat mega leak bit torrent is live -- join in ! 773 million||Feb 18 12:44||2|
|None of this is connectd||Feb 17 23:58||1|
|Unextreme and unrelated fish pie||Feb 17 23:52||1|
|UK Column News - 22nd February 2019||Feb 17 17:30||1|
|UK Column News - February 22 2019||Feb 17 17:29||1|
|UK Column News - 21st February 2019||Feb 17 17:22||1|
|UK Column News - February 21 2019||Feb 17 17:21||1|
|UK Column News - 20 February 2019||Feb 17 17:18||1|
|UK Column News - 20th February 2019||Feb 17 17:18||1|
|UK Column News - February 19th 2019||Feb 17 17:14||1|
|UK Column News - February 20 2019||Feb 17 17:13||1|
|UK Column News - 18 February 2019||Feb 17 17:13||1|
|UK Column News 19th - February 2019||Feb 17 17:09||1|
|UK Column News 19th February 2019||Feb 17 17:08||1|
|UK Column News - 18th February 2019||Feb 17 17:06||1|
|surveillance_not_ok||Feb 17 16:28||1|
|The earth is flat.||Feb 17 10:05||13|
|UKColumn News - 15th February 2019||Feb 16 17:09||1|
|2019 - the crash is coming||Feb 16 11:37||13|
|KASPERSKY INTERNET SECURITY 2019 - 366 DAYS (WINDOWS, MAC, ANDROID) ACTIVATION CODES SCAM.||Feb 15 22:26||3|
|UK Column News - 13th February 2019||Feb 13 20:35||1|
|Matthew 27:24-25||Feb 13 15:31||2|
|UK Column News 11th February 2019||Feb 12 08:36||1|
|meanwhile in russia #2||Feb 11 23:54||1|
|meanwhile in russia #1||Feb 11 23:38||1|
|http://dfilesus7ldn2ab6vitajolxrrf6ynx2fuskpx6bxamttpixvxzz7uqd.onion/uploads/tqMRZJXSOfE.jpg||Feb 11 17:51||1|
|It’s time for Europe to think systemically of how they could counter Moscow||Feb 11 16:31||2|
|Mateusz Piskorski, Russian agent of influence||Feb 11 16:21||2|
|It’s an organized, coordinated Russian campaign||Feb 11 16:20||2|
|Polish far-righ is known to be penetrated by Kremlin agents||Feb 11 16:06||2|
|Poland’s loud but politically marginal extreme right is openly Russophile||Feb 11 16:00||2|
|You won’t see much coverage of these weapons on Russian television||Feb 11 16:00||2|
|Amazon CEO Jeff Bezos rocked American politics||Feb 11 15:53||2|
|Mathias Rust||Feb 10 19:31||6|
|TrueCrypt 6.0 and 7.1a||Feb 10 17:11||3|
|New Win32 binary snapshot of pybitmessage available||Feb 10 10:31||10|
|New Biometric ID||Feb 10 07:04||2|
|test||Feb 10 06:05||1|
|dammit ! dang nigger pranked Dr. David Duke||Feb 10 00:59||5|
|HAPPY NEW YEAR!||Feb 9 21:22||6|
|UK Column News - February 12 2019||Feb 9 21:19||1|
|UK Column News - February 12th 2019||Feb 9 21:19||1|
|UK Column News - 12th February 2019||Feb 9 21:16||1|
|UK Column News - 11th February 2019||Feb 9 21:14||1|
|UK Column News - 9th February 2019||Feb 9 21:13||1|
|KASPERSKY INTERNET SECURITY 2019 - 366 DAYS (WINDOWS, MAC, ANDROID) ACTIVATION CODES SALE.||Feb 9 10:26||4|
|UK Column News - 8th February 2019||Feb 9 07:26||1|
|happy new year test message||Feb 8 18:31||1|
|0AA6C0B304A674D4D21EAD1279951858||Feb 8 11:40||1|
|Дмитрий Фёдорович Поляков||Feb 7 18:16||1|
|This week, the disinformation world’s attention was focused on Venezuela||Feb 7 18:09||2|
|UK Column News||Feb 7 09:10||2|
|UK Column News - February 2019 7th||Feb 7 07:45||2|
|UK Column News - 7 2019 February||Feb 7 07:40||1|
|UK Column News - 2019 February 7th||Feb 7 07:40||2|
|UK Column News - February 7th 2019||Feb 7 07:37||2|
|UK Column News - 2019 February 7||Feb 7 07:35||2|
|UK Column News - February 7 2019||Feb 7 07:29||1|
|UK Column News - 7th February 2019||Feb 7 07:25||3|
|UK Column News - 7 February 2019||Feb 7 07:25||1|
|Any-one in Rome??||Feb 6 22:42||3|
|UK Column News - 6 February 2019||Feb 6 18:42||1|
|Nothin' worth readin' 'ere||Feb 6 07:19||6|
|UK Column News - 4 February 2019||Feb 5 10:06||1|
|collection #1 --- super fat mega leak bit torrent is live -- join in ! 773 million||Feb 5 01:46||1|
|ready for it||Feb 3 13:40||2|
|UK Column News - 6th February 2019||Feb 2 15:57||3|
|UK Column News - 4th February 2019||Feb 2 15:57||5|
|UK Column News - 5th February 2019||Feb 2 15:57||4|
|G0d @ _0rbit -- Doxxing-Adventskalender -- CDU SPD FDP LINKE -- Bundestag-Hackerangriff||Feb 2 08:38||1|
|UK Column News - 1st February 2019||Feb 2 08:00||1|
|Ebook - History of Jihad From Muhammad to ISIS by Robert Spencer||Feb 1 23:19||1|
|Comprehensive list of channels||Jan 31 17:13||2|
|UK Column News - 30th January 2019||Jan 31 08:03||1|
|Currently, the World Order has fifty-three Earth built UFO||Jan 30 08:21||2|
|Looking for indicators of whether or not you’ve been abducted||Jan 30 08:05||2|
|KASPERSKY INTERNET SECURITY 2019 - 366 DAYS (WINDOWS, MAC, ANDROID) ACTIVATION CODES CRIME.||Jan 29 08:47||1|
|FARM GIRLS NO PANTIES||Jan 29 05:06||1|
|MY SUMMER BABE||Jan 29 03:45||1|
|UK Column News - 28th January 2019||Jan 28 17:57||2|
|Call to murder Angela Merkel, Emmanuel Macron, Petro Poroshenko, Jens Stoltenberg etc.||Jan 27 21:48||2|
|Jan 27 06:24||1|
|Drilling jumbo draft loading||Jan 26 23:28||1|
|ion pump culvert conduit||Jan 26 22:17||1|
|Tree iron with flat spiral||Jan 26 21:25||1|
|Phase conjugate cavity partyticket||Jan 26 21:25||1|
|Vibration source divided wing||Jan 26 21:24||1|
|Proposed projection mask||Jan 26 21:23||1|
|underpopulated means||Jan 26 21:23||1|
|General map simple||Jan 26 21:18||1|
|Diagnostic technique useful life period||Jan 26 21:18||1|
|Travelling bar break statement||Jan 26 21:18||1|
|hyperactive ostracon||Jan 26 21:16||1|
|Syntonized conjugated term||Jan 26 21:16||1|
|Noncocking thermal cracking give the gate||Jan 26 21:14||1|
|Cut line for block stone||Jan 26 21:07||1|
|Payment for merchandise the variations between samples||Jan 26 21:06||1|
|Fatigue ratio multifunction device||Jan 26 21:06||1|