Advertisement
Guest User

INTERNET LIBERATION ARMY - BANDWIDTH EXPROPRIATION FRONT

a guest
Aug 17th, 2013
500
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.76 KB | None | 0 0
  1. -INTERNET LIBERATION ARMY - BANDWIDTH EXPROPRIATION FRONT-
  2.  
  3. --Manifesto
  4. (SKIP THIS AND JUMP STRAIGHT TO THE HOW-TO IF YOU'RE BORED)
  5.  
  6. http://pastebin.com/1zah42RQ
  7.  
  8. --Why
  9.  
  10. You probably already know what the Onion network is. If you don't, read the TOR Project (https://www.torproject.org/about/overview.html.en) or the EFF (https://www.eff.org/pages/tor-and-https) first. Basically, all your traffic on the Onion network is passed through three random relays to confuse eavesdroppers (like the police, the government or hackers). If you're trying to access a website outside the Onion network, your traffic also goes through an exit node.
  11.  
  12. The problem is, someone has to run the relays and exit nodes on their own computers. And when all this traffic is coming through your computer, disguised as yours, it tends to attract a lot of attention from the police. And it pisses off your cable company. So there aren't a lot of exit nodes. This means that TOR, slow to begin with, can be slowed down a lot more by taking down just a few exit nodes.
  13.  
  14. But if everyone sets up exit nodes, spread out over several public Internet connections, the police can't shut them down or spy on the ones responsible.
  15.  
  16. --How to
  17.  
  18. ---Exit nodes
  19.  
  20. So, let's assume you've already downloaded the Tor browser bundle. If you haven't, get it from the TOR Project (https://www.torproject.org/download/download-easy.html.en). Now, you just have to open whatever folder you've saved it in and click Tor.exe. Create a shortcut, if you want. TOR Project has a good explanation of how to set up an exit node at this point (https://www.torproject.org/docs/tor-doc-relay.html.en).
  21.  
  22. However, you're not setting this up on your own computer. If you want to take the risk of having SWAT teams harass you or having your Internet connection shut off, that's fine. But I'm assuming you don't. So instead, we're going to liberate some bandwidth.
  23.  
  24. ---On public WiFi
  25.  
  26. This one's the simplest. Find somewhere with public WiFi, connect, and run TOR on their network as a relay or exit node. Unfortunately, their firewall or router settings may prevent other Onion users from finding your relay. It seems that you would need to find another network with better settings. Move to another known WiFi hotspot, or log into your neighbor's unsecured WiFi (if you're willing to pass the risk onto them).
  27.  
  28. Good places to find free public WiFi include McDonald's, Starbucks, hotel lobbies, and public libraries. If you still go to high school (secondary school to you Euro-brits) or university, use your school's WiFi network. Just be careful that they can't trace you based on your student account or something. There's also the option of using a paid WiFi network, but that's expensive and runs the risk of identifying you by your credit card.
  29.  
  30. ---On public computers
  31.  
  32. This one might be a little more complicated. But it's more secure than running things from your own device. First, get access to a public computer. It could be a library computer, or a computer at an Internet café. Anything that you would normally be allowed to use without logging in is fine. Try and get one in an area where other people can't snoop.
  33.  
  34. Now have the TOR Browser Bundle saved onto a USB stick (one of these things: https://upload.wikimedia.org/wikipedia/commons/thumb/8/86/SanDisk_Cruzer_Micro.png/800px-SanDisk_Cruzer_Micro.png). It's safest to download it through TOR itself onto a USB stick you've never used before, but if you're not excessively paranoid any old USB drive will do.
  35.  
  36. Now copy the folder with the browser bundle in it to the target computer. Try to put it somewhere no one will ever check, like My Music or Downloads. Then run Tor.exe. The TOR Browser and Vidalia will pop up. Exit out of the TOR Browser altogether; you don't want it out in the open. Then, tell Vidalia to run as an exit node. If it asks, choose the highest bandwidth setting. Your friendly neighborhood institutions can afford it.
  37.  
  38. Minimize Vidalia to the system tray and remove your USB, and it's unlikely anyone will even notice it's running. Pray that the firewall settings allow other users to find your relay. Until that computer shuts down, it'll run as a relay/exit node. And, if you're feeling particularly adventurous, come back later and run TOR up again from the same folder you installed it to.
  39.  
  40. --Conclusion
  41.  
  42. Spread this guide. If you notice any technical errors, fix them. (Just don't touch the manifesto.) Make as many copies as possible. Spread the name of the Internet Liberation Army - Bandwidth Expropriation Front. There is no formal ILA-BEF organization, because you are the ILF. So propagandize and fill the tubes! To the cryptocades!
  43.  
  44. --Recommended reading
  45. ---Cybernomicon by the Cypherpunks
  46. ---Assassination Politics by Jim Bell
  47. ---The Crypto-Anarchist Manifesto
  48. ---1984 by George Orwell
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement