Tag Archive: BitTorrent


___________________________________________________________
>>> Anonymous: Project Mayhem 2012 // Call to Action – Code TYLER! <<<
        Dear fellows…
        We have grown fast along this world at rebellion.
        With freedom in one hand and fistful of truths at the other.
        Imagine we all evolve to make it exponential in order to a true planetary revolution.
        This can be as real as you decide it to be.
        We are all Anonymous.
        You are anonymous.
        We are all painting our world with colorful screams.
        We are all making Titans, that make us dream and give us strength to leave the cave.
        But imagine we all finally find the courage needed.
        to become the real change we wish to see in the World.
        Imagine we conquer Freedom by beginning to be Free.
        Imagine we conquer Justice by beginning to do fair.
        Imagine we conquer Truth by beginning to do and be True to ourselves.
        Imagine we re invent and reverse Reality.
        Imagine we finish corrupt banksters.
        Imagine we finish corrupt governments.
        Imagine we finish corrupt Corporations.
        Imagine war is over.
        Imagine no more of Fear.
        In this system built upon lies…
        Information equals Power.
        Imagine we start a Fight Club.
        Imagine we purchase an USB drive.
        Imagine we take it to our workplaces and pretend we have to work late hours.
        Imagine we accumulate all sort of evidences about illegal deeds.
        Imagine Conscientious insiders worldwide begin to expose all lies,
        inevitable and immortally, because no one can kill the messenger.
        Imagine we code an extremely simple interface so that anyone can do it.
        Imagine we all synchronize our clocks to act at the same Time,
        on the Winter solstice, The 21st of December 2012 at eleven minutes past eleven local time.
        On the 5th of November 2012 TYLER will be out of beta testing.
        TYLER is a massively distributed and decentralized
        Wikipedia style p2p cipher-space structure impregnable to censorship.
        This is a call to action to all top hacktivists, coders, cryptoanarchists, cypherpunks,
        Non-violent Civil Rights activists, free artists, Internet Censorship
        and Freedom of Speech activists everywhere to collaborate
        to jointly BRAINSTORM IDEAS to develop and improve TYLER,
        with the lessons learned from Wikileaks, Freenet, TOR, G-N-U net, e-Mule,
        BitTorrent, I2P, Tribler and many other projects.
        From the 12th of December 2012, to the 21st of December 2012,
        people all over the world upload the evidence of illegality corruption
        and fraud They have gathered To TYLER.
        Imagine.
        Imagine We leak all.
        And you know it, because Tyler knows it.
        We are Anonymous.
        We do not forgive.
        We do not forget.
        Expect us.
### “I see the strongest and the smartest men who have ever lived… and these men are pumping gas and waiting tables.” Chuck Palahniuk, Fight Club, Chapter 19 ###
Project Mayhem 2012 ‘Dangerous Ideas #1 and #2’:
Project Mayhem 2012 Tyler:
TYLER forum discussion:
TYLER pad discussion:
(Don’t BEE afraid to start your OWN seKret TYLER)
Project Mayhem 2012.
Game OVer.

Crossroads News : Changes In The World Around Us And Our Place In It

 

 

 

 

IT :  Internet News / New Technology – Security

 

 

 

 

Researchers uncover the full scale and weaknesses of the monitoring of illegal file sharers

 

Research by computer scientists at the University of Birmingham has found that the monitoring of online file sharing is more prevalent than previously thought. They also conclude that in many cases, the evidence gathered through monitoring is not admissible in court. This research will be presented tomorrow at the SecureComm Conference in Padua.

To provide legal evidence of file sharing, a monitoring company must make a direct connection to a suspected file sharer and log their activity. This three-year study is the first to look at the behaviour of monitors that make direct connections.

The researchers’ findings include:

Massive monitoring of all of the most popular illegal downloads from the PirateBay has been taking place over the last 3 years.
On average an illegal file sharer, using BitTorrent to download the most popular content, will be connected to and have there IP address logged within 3 hours of starting a download.
Poor collection methods mean the evidence collected by monitors may not stand up in court.

The research was carried out by developing software that acted like a BitTorrent file sharing client, and logged all the connections made to it. Careful analysis of the logs revealed the presence and behaviour of file-sharing monitors.

Most large-scale monitors hide their identity by using third party hosting companies to run the searches for them, but other monitors are identifiable as copyright enforcement organisations, security companies and even government research labs. The researchers also found that the use of third party hosting companies allowed the monitors to avoid ‘block lists’,that attempted to stop known monitors from connecting to file sharers.

Dr Tom Chothia, researcher at the University of Birmingham’s School of Computer Science, says, “This work reveals the full scale of the monitoring of illegal file sharers. Almost everyone that shares popular films and music illegally will be connected to by a monitor and will have their IP address logged. What is done with this information in the long term only time will tell”.

With the number of prosecutions of file sharers increasing there is a legitimate concern of the standard of evidence used in these cases.  Dr Chothia continued: ‘All the monitors observed during the study would connect to file sharers believed to be sharing illegal content and verify that they were running the BitTorrent software, however they would not actually collect any of the files being shared. Therefore, it is questionable whether the monitors observed would actually have evidence of file sharing that would stand up in court.’

This work was carried out by Tom Chothia, Marco Cova, Chris Novakovic, and Camilo Gonzalez Toro at the University of Birmingham’s School of Computer Science.

Provided by University of Birmingham

Environmental

earthrise : Episode one

Uploaded by on Oct 1, 2011

As the population booms and demand strains the world’s meat supply, there is a need for alternatives to animal proteins. Plus, Britain’s Pearl Mussels and stopping the Sahara Desert to extend its reach.

Seed Balls in Cambodia

Published on May 4, 2012 by

http://permacultureplanet.com/
Itinerant permaculture teacher Rico Zook and local Khmer permaculturist Hoeuy Han join Ockenden Cambodia to make seedballs.
This film was recorded at a 10 hectare potential permaculture demonstration site in Cambodia’s Banteay Meanchey province.

Human genes engineered into experimental GMO rice being grown in Kansas

By Ethan A. Huff, 
(NaturalNews) Unless the rice you buy is certified organic, or comes specifically from a farm that tests its rice crops for genetically modified (GM) traits, you could be eating rice tainted with actual human genes. The only known GMO with inbred human traits in cultivation today, a GM rice product made by biotechnology company Ventria Bioscience is currently being grown on 3,200 acres in Junction City, Kansas — and possibly elsewhere — and most people have no idea about it. Since about 2006…
Read Full Article Here

**********************************************************************************************************

Cyber Space

John McAfee, Antivirus Pioneer, Arrested by Belize Police

By John E Dunn, techworld.com

McAfee antivirus founder John McAfee is reportedly taking legal advice after a raid on his Belize home by police resulted in the software entrepreneur’s arrest and the death of his pet dog.

The raid in the early morning of 1 May by the country’s armed ‘Gang Suppression Unit’ (GSU) allegedly involved the doors to McAfee’s house being smashed down, his property ransacked, and his dog shot.

After searching the house for drugs and firearms and handcuffing him and his 12 employees, the police detained McAfee for a number of hours before releasing him at 2am the following morning.

The police haven’t given a reason for the raid but did reportedly find a cache of weapons including 12 gauge shotguns, handguns, rifles with scopes and ammunition. McAfee said he’d presented permits for all but one of the weapons which were for his company’s security.

“The entire day was an incredible nightmare. This is clearly a military dictatorship where people are allowed to go and harass citizens based on rumor alone and treat them as if they are guilty before any evidence whatsoever is obtained,” McAfee was reported as telling a local TV station after the raid.

McAfee blamed events on his refusal to donate money to “the local political boss” in his locality. No charges have been made.

Read Full Article Here

Judge Throws out Mass John Doe Porn Copyright Lawsuits

By Grant Gross, IDG News

A judge in New York has shot down the attempt of three pornography studios to sue nearly 80 people for allegedly downloading movies on BitTorrent, with the judge slamming the studio’s efforts to file lawsuits against multiple anonymous defendants.

Magistrate Judge Gary Brown denied the studio requests to subpoena the names associated with 79 IP addresses, with Brown arguing that IP addresses aren’t enough evidence to pinpoint who actually downloaded a file from BitTorrent.

“The assumption that the person who pays for Internet access at a given location is the same individual who allegedly downloaded a single sexually explicit film is tenuous, and one that has grown more so over time,” Brown wrote in his ruling, first noted by the Fight Copyright Trolls blog. “An IP address provides only the location at which one of any number of computer devices may be deployed, much like a telephone number can be used for any number of telephones.”

Brown, of U.S. District Court for the Eastern District of New York, allowed the lawsuits to move forward against only one defendant in each of four so-called John Doe lawsuits targeting anonymous Internet users.

Brown’s 26-page order, issued Tuesday, could be a turning point in a massive effort to sue BitTorrent users for copyright infringement, said Mitch Stoltz, an attorney with the Electronic Frontier Foundation, a digital rights group that has opposed the John Doe lawsuits.

Since mid-2010, movie studios and other content producers have sued more than 220,000 BitTorrent users for copyright infringement, Brown noted in his ruling, citing a U.S. News and World Report story.

Brown’s ruling was broader than BitTorrent decisions from most other judges, and could be a model for future court decisions, Stoltz said. There’s been a “huge split” among judges on whether to grant subpoena requests in these mass John Doe infringement lawsuits, although judges in California, Illinois and Washington, D.C., have taken similar stances to Brown’s, he said.

“Many [judges] will see this as confirmation,” Stoltz said of Brown’s ruling. “There absolutely is a trend toward shutting down this sort of abuse of discovery.”

Read Full Article Here

NASA acknowledged Friday an attack on one of its websites by “The Unknowns,” a group that has been publicly trickling information on websites it has hacked over the last few weeks.

The Unknowns claimed to have hacked a NASA website hosted at the Glenn Research Center on May 1, said Sally V. Harrington, a public affairs specialist with the center in Cleveland, Ohio, in an email statement.

“NASA security officials detected an intrusion into the site on April 20 and took it offline,” she said. “The agency takes the issue of IT security very seriously and at no point was sensitive or controlled information compromised.”

The Unknowns posted a wrap up of several weeks of hacking on Pastebin earlier this week, claiming to have also hit a sub domain belonging to the U.S. Air Force, the French Ministry of Defense and the European Space Agency, among others.

The group also claimed to have hacked the Bahrain Ministry of Defense, but the website actually belongs to the Ministry of Development in Brunei, a small nation on Borneo next to Malaysia.

The Unknowns released about 215MB of documents that it said came from the U.S. Air Force. The information varied from receipts for expense reports to documents related to emergency communications plans. Many documents were dated 2012, and some carried the label “unclassified.” U.S Air Force officials did not have an immediate comment.

The Unknowns wrote on its Twitter feed on Thursday that “we’re soon going to e-mail our victims informing them on how we penetrated…their databases, they will get all the info they need.”

On its Pastebin post, the group gave a bit more insight into its motives, saying to the websites affected “we probably harmed you a bit but that’s not really our goal.” They said if they wanted to do harm, the websites would have been defaced.

Send news tips and comments to jeremy_kirk@idg.com

Could The Pirate Bay suffer the same fate as MegaUpload?

Published on May 4, 2012 by

Internet freedom has suffered another blow. In the United Kingdom, The Pirate Bay website was blocked to millions of users. A UK high court ruled that the country’s leading Internet Service Providers had to censor the site, claiming that both the Bay and its users were breaking copyright laws. David Seaman, journalist and host of The DL Show, joins us to take a closer look at the case.

**********************************************************************************************************

Survival / Sustainability

Fresh Farm Cheese in 4 Easy Steps

Tess Pennington
Ready Nutrition

For some time, it has been a goal of mine to make fresh cheese. In all honesty, I was a bit intimidated by the process, but I found this simple recipe that I wanted to share.

It uses plain milk, requires no special equipment, and produces a homemade soft and spreadable cheese. The best part is you can substitute powdered milk for the whole milk and make fresh cheese using your emergency food supply items!

After learning the basic recipe, you can begin changing the flavor and adding your favorite spices, zest, extracts or herbs. My favorite is fresh cracked pepper, garlic powder and Italian herbs.

This recipe only takes about 15 minutes to make and is delicious. So get creative and enjoy!

Fresh Farm Cheese

Ingredients:

2 quarts whole organic milk (use pasteurized, instead of ultra-pasteurized, if available)
2 cup buttermilk
1 tablespoon white vinegar or lemon juice
1 1/2 tsp sea salt
cheesecloth, rinsed

Preparation:

In a heavy-bottomed pot, over low heat, slowly heat the milk up, stirring often, until it is just about to simmer (about 180 degrees F). Stir in the buttermilk, and then the vinegar, and turn off the heat. Very slowly stir until you see the milk separating into curds (the solids) and whey (the liquid). Leave undisturbed for 10 minutes.

Line a large strainer with 2-3 layers of cheesecloth, and place over a stockpot to catch the whey. After the 10 minutes, ladle the curds into the cheesecloth, and allow the whey to drain for 10 minutes. Gather up the edges of the cheesecloth, and tie a string around the top to form bundle.

Tie the string to a wooden spoon or dowel, and hang the cheese curds over the stockpot and continue draining for 30 minutes

After draining, remove the cheese from the cloth, and transfer into a container. Stir in the salt and refrigerate. This fresh cheese can be used for up to 5 days. Use as a spread, or as you would use cream cheese, or cottage cheese.

Author: Tess Pennington
Web Site: http://www.ReadyNutrition.com/

Date: March 20th, 2012

Related Categories: Homesteading, Recipes

Week 7 of 52: Basic Home Security

Tess Pennington
Ready Nutrition
Everyone wants to believe that they are safe and sound when they latch the windows and lock the doors. We even experience an added security boost when we live in an expensive neighborhood, a home with a security system, and an active neighborhood watch program. Today, we would all love to have Gladys Kravitz (Bewitched) as our next door neighbor. In reality, security gadgets can protect the outside of your home, but it’s meaningless if you cannot protect what’s inside. People can still be mugged, burglarized, and attacked simply by opening the door to a stranger or by leaving vulnerable areas of their home exposed. I’m going to ask you a question. Have you ever placed a key under a mat? I ask this because we all have placed the spare key under the mat at one time, and the burglars know that trick. It is not my intention to promote fear, but to awaken you to potential hazards. You want to make breaking into your home difficult.

Designing a home defense system that includes multiple security layers is a proactive way to protect your home, family, and belongings. Security layers are preventative measures that will advertise to intruders that they should avoid your home altogether. The more layers you have in and around your home, the less likely a criminal is going to choose your home as his/her next “job.”

Read Full Article Here

***********************************************************************************************************

Activism

Egypt clashes video: Troops water-cannon protesters at Cairo rally

Published on May 4, 2012 by

Egyptian armed forces and protesters clashed in the capital Cairo on Friday, with troops firing water cannon and tear gas at demonstrators who threw stones as they tried to march on the Defense Ministry in the Abbasiyah district, a flashpoint for a new cycle of violence only weeks ahead of presidential elections. The troops fired water cannon at protesters and hurled stones at them to keep them from advancing. The protesters took shelter behind metal sheets snatched from a nearby construction site and hurled back stones. Others climbed the roof of a nearby university and showered soldiers with rocks from above. The troops then opened up with heavy volleys of tear gas that pushed the demonstrators back. The Health Ministry reported eight protesters were injured. The security forces also appeared to sustain casualties.

Demonstrators In Suez Peacefully March Against Military Rule

Published on May 4, 2012 by

Today, about a thousand demonstrators marched in Egypt’s port-city of Suez in protest against the country’s military rulers.

Hundreds injured as police storm Cairo rally

Published on May 4, 2012 by

Egypt’s military rulers have imposed an overnight curfew after a day of fighting between protesters and troops in the country’s capital.

Almost 300 people have been injured in the clashes and one soldier was killed. Demonstrators rallying outside the ministry of defence were angry about the killing of 11 protesters on Wednesday.

Protesters gathered at al-Abesseya square had been trying to march to the defence ministry.

They were blocked by security forces firing tear gas and water cannon, reportedly after they tried to breach the barriers on the road to the ministry.

Many were pushed back into neighbouring streets and the nearby Ain Shams university.

State media said some people who had been protesting peacefully in Tahrir Square had then started to march towards the Defence Ministry.

Al Jazeera’s Steve Chao reports.

***********************************************************************************************************

Whistle blowers

“We are Preparing for Massive Civil War,” Says DHS Informant

Posted by

In a riveting interview on TruNews Radio, Wednesday, private investigator Doug Hagmann said high-level, reliable sources told him the U.S. Department of Homeland Security (DHS) is preparing for “massive civil war” in America.

“Folks, we’re getting ready for one massive economic collapse,” Hagmann told TruNews host Rick Wiles.

“We have problems . . . The federal government is preparing for civil uprising,” he added, “so every time you hear about troop movements, every time you hear about movements of military equipment, the militarization of the police, the buying of the ammunition, all of this is . . . they (DHS) are preparing for a massive uprising.”

Hagmann goes on to say that his sources tell him the concerns of the DHS stem from a collapse of the U.S. dollar and the hyperinflation a collapse in the value of the world’s primary reserve currency implies to a nation of 311 million Americans, who, for the significant portion of the population, is armed.

Uprisings in Greece is, indeed, a problem, but an uprising of armed Americans becomes a matter of serious national security, a point addressed in a recent report by the Pentagon and highlighted as a vulnerability and threat to the U.S. during war-game exercises at the Department of Defense last year, according to one of the DoD’s war-game participants, Jim Rickards, author of Currency Wars: The Making of the Next Global Crisis.

Through his sources, Hagmann confirmed Rickards’ ongoing thesis of a fear of a U.S. dollar collapse at the hands of the Chinese (U.S. treasury bond holders of approximately $1 trillion) and, possibly, the Russians (threatening to launch a gold-backed ruble as an attractive alternative to the U.S. dollar) in retaliation for aggressive U.S. foreign policy initiatives against China’s and Russia’s strategic allies Iran and Syria.

“The one source that we have I’ve known since 1979,” Hagmann continued.  “He started out as a patrol officer and currently he is now working for a federal agency under the umbrella of the Department of Homeland Security; he’s in a position to know what policies are being initiated, what policies are being planned at this point, and he’s telling us right now—look, what you’re seeing is just the tip of the iceberg.  We are preparing, we, meaning the government, we are preparing for a massive civil war in this country.”

Read Full Article Here

Related Links

DAILY TRUNEWS BROADCAST

Before It’s News

************************************************************************************************************
[In accordance with Title 17 U.S.C. Section 107, this material is distributed without profit, for research and/or educational purposes. This constitutes ‘FAIR USE’ of any such copyrighted material.]