Jump to content
Our website is made possible by displaying online advertisements to our visitors.

Please consider supporting us by disabling your ad blocker.


  • Content count

  • Joined

  • Last visited

  • Days Won


rbear last won the day on August 7 2015

rbear had the most liked content!

Community Reputation

240 Excellent

About rbear

  • Rank
    Forum Veteran
  1. A law school professor previous criminal defense attorney tells u why you should never talk to the cops. CopBlock Wins First Amendment Lawsuit The following post and video was shared with the CopBlock Network by Bryan Jeffers of SEMO Cop Block, via the CopBlock.org Submissions Page. The post discusses an incident they were involved in where city officials, including the mayor, chief of police, and county sheriff retaliated against them for flipping the mayor off, which is a First Amendment protected act of Free Speech. Among other things, they had their water meter removed by city workers, even though they were current on their bill. Within the video, the fact that they were paid up to date on their water bill and that the removal was ordered as an act of retaliation is admitted. Ultimately, these acts of retaliation led to a lawsuit by jeffers and his mother Tina Warren, which was supported by the ACLU. The post below details the resolution of that lawsuit and conditions under which it was resolved. cut continues on link below copblock
  2. The Swedish government is laying the blame for the migrant rape crisis at the feet of… the victims. about it besides comments DS
  3. It’s getting hard to document all these happenings. Basically, we’re reaching the point where major Negro revolts are slipping through the cracks. This is because they’re happening so fast that we can’t keep up. This will be a happening mega-post to try to tie everything together. Police are responding to an active shooter situation and b\_0mb threat at a children’s hospital in Miami, Florida. No injuries have been reported, and the hospital later said that the report of a shooting was a false alarm. Officers from the Miami-Dade Police Department blocked off at least one entrance to Nicklaus Children’s Hospital on Friday, responding to a bomb threat and an active shooter situation on the premises. Guy Pulls Gun On BLM Protesters In Oregon A man was arrested after he allegedly pulled a handgun on Black Lives Matter protesters in Portland, Ore., Thursday night in an incident that occurred almost at the same a sniper opened fire on police officers at a protest in Dallas. A video appears to show the man, identified by the Oregonian as 36-year-old Michael Strickland, arguing and backing away from protesters holding what appears to be a video camera. He then pulls out a pistol, pointing it at the group and telling them to back away before returning the weapon to a holster on his hip. Strickland, who was charged with misdemeanor menacing and second-degree disorderly conduct, told the Oregonian that he pulled out his gun because “anarchists” were pushing him and telling him to leave. Police shot in Georgia A police officer was shot while responding to a damage to property call at an apartment complex Friday morning. The call came in just before 8:00 to the Three Oaks Apartments in Valdosta. According to the Georgia Bureau of Investigation, which has been called in to take over the investigation, Valdosta Police Officer Randal Hancock responded to a call of a break-in at the complex. cut long cont DS
  4. To the surprise of no one, a group of wacky nutjobs at the United Nations is defending the Dallas Sniper Attack and saying the US needs to do something about the invisible secret racist conspiracy. We already made a Negro President, guys, and we have a state policy of giving all Black people unlimited free everything forever – wtf do you want us to do? There is a high level of structural and institutional racism in the US, Ricardo A. Sunga III, chair of the UN expert panel on people of African descent, said, commenting on the back-to-back killing of two black men by the American police. “The Working Group [of Experts on People of African Descent] is outraged and strongly condemns the new police killings of two African-American men,” Sunga said in a statement published on the United Nations’ official website. The deaths of Philando Castile in Minnesota and Alton Sterling in Louisiana at the hands of the officers earlier this week, “cannot be ignored,” the statement read, urging a “prompt independent investigations to ensure the perpetrators are prosecuted and punished.” The UN working group stressed that excessive use of force by the police against African Americans has become a “regular” occurrence in America, with black people twice as likely to be shot as whites. According to the Department of Justice, in 2013, a Black was six times more likely to commit murder than a White. So if they’re only twice as likely to be shot by a cop, that means cops are three times more careful when dealing with Blacks. cut long cont DS
  5. Not exactly, some have a password just to be able to "login" from those that don't. There are alot of shared passwords, because maybe the objective is just a better connection, not simply trying to hide something or block something. Also sites like bugmenot/others are helpful sometimes because some things are behind a wall and are not able to be loaded without a pw. Ever had to sign up just to read a news article? Often times you do so, and then it doesn't even work, so bugmenot/etc is helpful. Now to make all the users felons, that is just insane. We all know government accountability is not much, but what if since computers have passwords on them, then anyone ever gets into it w/o asking (hacters/gov/etc), and they were all held accountable? Notice how they do things, then later say "its bad, you can't do it, only we can?". What happened to equal protection or even following the law anyways?
  6. For the most part, 72 people in the beginning controlled the prices of bitcoin, then came mtgox/etc (go to places for freedom stuff if thats what you want to call it (lol), then came the markets & jackers, then came the fake jackers of the market/hacters, then came the f b i thieves stealing the coins, then came regulation, then came asic strip miners which destroyed the small guys, then came the tor to steal/lie/jack by govt, then came "we coming for what ours, how dare you try to compete with us. This is pretty much the summary of the events.
  7. They just don't like competition ISRAEL’S $1 BILLION DOLLAR PER YEAR SLAVE TRADE INDUSTRY Pic
  8. Bitcoins used to buy images of child sex abuse could soon be tracked and blocked as two companies share data on how the virtual currency is spent. The Internet Watch Foundation (IWF), which tracks abuse sites, is passing data to start-up Elliptic, which helps Bitcoin exchanges monitor transactions. The data comes from transactions carried out on sites the IWF monitors The IWF said the "pseudo-anonymity" offered by bitcoins made them an increasingly popular form of payment. "We are seeing it being used on the more dedicated commercial abuse sites that we monitor on a regular basis," said Sarah Smith, IWF's technical researcher. Ms Smith said the IWF had first noticed the virtual currency being used in 2014 alongside other payment systems, but its use on abuse sites was growing alongside other illicit use of the virtual cash. cont bbc related http://www.conspiracyoutpost.com/topic/11436-researchers-discover-over-100-tor-nodes-designed-to-spy-on-hidden-services/ Researchers Discover Over 100 Tor Nodes Designed To Spy On Hidden Services
  9. They just federally criminalized millions... --- One of the nation’s most powerful appeals courts ruled Wednesday that sharing passwords can be a violation of the Computer Fraud and Abuse Act, a catch-all “hacking” law that has been widely used to prosecute behavior that bears no resemblance to hacking. In this particular instance, the conviction of David Nosal, a former employee of Korn/Ferry International research firm, was upheld by the Ninth Circuit Court of Appeals, who said that Nosal’s use of a former coworker’s password to access one of the firm’s databases was an “unauthorized” use of a computer system under the CFAA. The decision is a nightmare scenario for civil liberties groups, who say that such a broad interpretation of the CFAA means that millions of Americans are unwittingly violating federal law by sharing accounts on things like Netflix, HBO, Spotify, and Facebook. Stephen Reinhardt, the dissenting judge in the case, noted that the decision “threatens to criminalize all sorts of innocuous conduct engaged in daily by ordinary citizens.” In the majority opinion, Judge Margaret McKeown wrote that “Nosal and various amici spin hypotheticals about the dire consequences of criminalizing password sharing. But these warnings miss the mark in this case. This appeal is not about password sharing.” She then went on to describe a thoroughly run-of-the-mill password sharing scenario—her argument focuses on the idea that Nosal wasn’t authorized by the company to access the database anymore, so he got a password from a friend—that happens millions of times daily in the United States, leaving little doubt about the thrust of the case. The argument McKeown made is that the employee who shared the password with Nosal “had no authority from Korn/Ferry to provide her password to former employees.” At issue is language in the CFAA that makes it illegal to access a computer system “without authorization.” McKeown said that “without authorization” is “an unambiguous, non-technical term that, given its plain and ordinary meaning, means accessing a protected computer without permission.” The question that legal scholars, groups such as the Electronic Frontier Foundation, and dissenting judge Stephen Reinhardt ask is an important one: Authorization from who? Reinhardt argues that Nosal’s use of the database was unauthorized by the firm, but was authorized by the former employee who shared it with him. For you and me, this case means that unless Netflix specifically authorizes you to share your password with your friend, you’re breaking federal law. cont vice
  10. more on this http://www.slyck.com/forums/viewtopic.php?t=72403 is distributed as a file converter application through reputable websites that offer Mac software. EasyDoc Converter In the background, the application executes a shell script that installs multiple malicious components in a folder called “/Users/$USER/Library/.dropbox." The Dropbox name is used to make the malware harder to spot and has nothing to do with the legitimate Dropbox file synchronization software. -- Not sure about reputable websites that offer mac software, because I have found this in tons of p2p files/videos in the folders. Apparently you don't even have to click on easydoc converter as when its re-assembled, it seems to auto load. The message with the files say "for mac users" or some other message similar. I deleted the garbage on some files, I may have it laying around somewhere though as I don't always do that. I figured in the future I would just do a search and remove lots rather than manually each one. I noticed something was wierd when I seen the program and instructions and then even was like wth is this "/Users/$USER/Library/.dropbox" while I have dropbox, (rarely used), I don't have it installed, so was immidiately suspicious. Also the machine the stuff is on is winblows 7. Not sure if the program could actually do anything to winblows machines, but it did put itself in /Users/$USER/Library/.dropbox and there were other places I don't remember at the moment.
  11. Meanwhile https://pbs.twimg.com/media/Cm48DFYVMAAau7d.jpg
  12. u would think they wouldn't be mad pic https://twitter.com/RealDoctorWhite/status/751601009827336193
  13. The President of the Russian Federation, Vladimir Putin, has ordered the Federal Security Service (FSB) to produce "encryption keys" to decrypt all data on the internet, and the FSB has two weeks to do it, Meduza reports. The head of the FSB, Alexander Bortnikov, is responsible for accomplishing such a task. "The new 'anti-terrorist' laws require all 'organizers of information distribution' that add 'additional coding' to transmitted electronic messages to provide the FSB with any information necessary to decrypt those messages," reports Meduza. "It's still unclear what information exactly online resources are expected to turn over, given that all data on the internet is encoded, one way or another, and in many instances encryption keys for encrypted information simply don't exist." cont Slashdot --- Good luck, my encryption changes with every bit/byte/etc sent. You can't just have one key to unlock it as each ...... is different. What they usually do is scoop up the outgoing data for collection later at the exit points, as well as copy all data going in. (redundancy). Sharing an ip with tons of other people makes data correlation not really feasible since there is so much traffic going in and out. They may have it unencrypted on the exit, but which one of the millions of users is it since thousands share the same ip and often the data is sent from server 1 to server 2 then onto the route mixed?
  14. These nodes -- ordinary nodes, not exit nodes -- sorted through all the traffic that passed through them, looking for anything bound for a hidden service, which allowed them to discover hidden services that had not been advertised. These nodes then attacked the hidden services by making connections to them and trying common exploits against the server-software running on them, seeking to compromise and take them over. The researchers used "honeypot" .onion servers to find the spying computers: these honeypots were .onion sites that the researchers set up in their own lab and then connected to repeatedly over the Tor network, thus seeding many Tor nodes with the information of the honions' existence. They didn't advertise the honions' existence in any other way and there was nothing of interest at these sites, and so when the sites logged new connections, the researchers could infer that they were being contacted by a system that had spied on one of their Tor network circuits. This attack was already understood as a theoretical problem for the Tor project, which had recently undertaken a rearchitecting of the hidden service system that would prevent it from taking place. cont schneier comment posted jic it disapears on schneier Marco • July 8, 2016 4:44 PM Well, actually I published a software for spotting malicious TOR nodes here :http://marcoramilli.blogspot.it/2015/12/spotting-malicious-node-relays.html?m=1 Maybe you could find it interesting.. Bye
  15. ywc, (your welcome) Those prescription strength ones are like, (did they forget what a prescription is supposed to do really lol) not good at all from my experience either. As for me, well I am going to look for aluminum free/etc ones (antiperspirant/deodorant). Each time I looked before, well the price is about $4.50 compared to $1.08-$1.26 after tax. I just used toe aluminum ones considering I could get about 3 for the price of 1. (money stretched). Anywho, I am going to work more on that soon as I got about 2 alum ones left before I'm out.
  1. Jump To Top