background preloader

Online Activism documentation

Facebook Twitter

HOW TO JOIN ANONYMOUS - A BEGINNER'S GUIDE mobile. EtherPad: h7k1Pi6Wcp / Revision 7. │ Comment agir ?? │ Avant d'agir, un petit rappel des règles minimales de navigation/IRC sécurisée: Nous ne parlerons pas de LOIC ou d'attaques informatiques sur cette page. ─ Proposer ou améliorer des care-package : ──────────────────────────── AnonymousCarepackageLight.zip : ─ Proposer ou améliorer des tutoriels ou des guides : ───────────────────── ─ Diffuser les informations vérifiées : ───────────────────────────────── Vous pouvez fournir des liens récents au salon sur des sujets d'actualité concernant les Anonymous, nos actions, la liberté d'expression sur Internet, l'actualité internationale, l'actualité nationale (HADOPI, LOPPSI2)... ─ Regrouper les informations vérifiées : ─────────────────────────────── Si vous fouinez le net pour trouver des vidéos, liens, textes; regroupez l'ensemble dans un pad afin de permettre à ceux voulant se renseigner de le faire plus vite.

Créez des pad sur les différents sujets internationaux et nationaux. Ceux-ci illustrent les opérations en cours. Relay Configuration Instructions. The Tor network relies on volunteers to donate bandwidth. The more people who run relays, the faster the Tor network will be. If you have at least 2 megabits/s for both upload and download, please help out Tor by configuring your Tor to be a relay too.

You can run a Tor relay on pretty much any operating system. Tor relays work best on current distributions of Linux, FreeBSD, NetBSD, and Windows Server. The best approach for most users is to run your relay on Debian or Ubuntu using the system Tor package — the deb takes care of running Tor as a separate user, making sure it has enough file descriptors available, starting it at boot, and so on. Configure Tor by editing the torrc file Tor's configuration file is named 'torrc'.

Locate the file on your system, open it with a text editor and add the following lines: ORPort 443 Exitpolicy reject *:* Nickname ididntedittheconfig ContactInfo human@... Tor will use all your bandwidth if you don't set limits for it. Make sure your relay is reachable. Proxy Server Definition & Proxy Chains. Proxy Chaining Proxy Servers A proxy is a server that acts as a gateway between your computer and your destination (website, IRC chat, etc.).

These proxies receive requests from users to view, for example, a web page. The proxy will then forward the request to the internet, find your requested page, then send the web page back to you, the user. Most proxies come with a cache (sounds like “cash”) feature that saves former websites that were visited on that proxy. Think of cache as a proxy’s storage room. So if the user or someone else requests the same site again later on, the proxy will go back into its cache, find the web page and send it back to the user. The use of proxies to stay anonymous is a favorite thing to do among people on the Internet who are either paranoid or just security conscious. [User]>>>>>[Proxy]>>>>>[Web Pages] Simple enough, right? Proxy Chaining Proxy chaining is merely connecting to more than one proxy and then to your intended destination.