avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Sunday July 21, 2024, 9:35 am
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Topics - Renegade [ switch to compact view ]

Pages: prev1 2 3 [4] 5 6 7 8 9 ... 41next
Living Room / Interview with John McAfee
« on: February 01, 2015, 09:58 PM »
The techno-wildman is interviewed by Jeff Berwick.

John tells some of the story of how he escaped from Belize, and talks about privacy.

(NSFW language)

Living Room / What do you want to ask Edward Snowden? Now you can!
« on: January 30, 2015, 05:42 AM »
VoL is collecting questions from people for an interview with Ed Snowden.


Ask NSA Whistleblower Edward Snowden Your Questions

An Epidemic of Truth-Telling with Edward Snowden

Voices of Liberty Proudly Presents:
An Exclusive Session with NSA Whistleblower Edward Snowden

In a Voices of Liberty exclusive event, Edward Snowden will reveal his political ideas, positions on issues and provide insight on how to cause an epidemic of truth-telling, as called for by former Congressman Ron Paul.
Be sure to participate in the poll below to show your position on Edward Snowden as a hero or traitor.

Ask Edward Snowden your question!

Today YOU have an opportunity to pose the burning question you’ve always wanted to ask Edward Snowden! We are accepting submissions and will select from among them the questions we will ask Edward Snowden in an upcoming interview. Your question could have a chance to be heard and answered by the famous NSA whistleblower. So what are you waiting for?

I'm curious as to how he'd respond to comments about him (the issues he raises) being a limited hangout.

Developer's Corner / [Free Book] Blockchain Programming in C#
« on: January 18, 2015, 04:13 AM »


Aspiring developers are looking at Bitcoin in order to take their coding skills to the next level. Even though there are plenty of hints, tips and tricks to be found on the internet, an actual “coder’s manual” is not as easy to find as one might want. That is about to change however, as the first part of “Blockchain Programming in C#” has been made available for free.

Nicolas Dorier is the author and creator of “Blockchain Programming in C#”. The reason for making this series of books available to the public for free, is because Nicolas strongly believes that one of the way to make Bitcoin successful is to teach developers how to program it themselves. But how do you get started in the world of Bitcoin and cryptocurrency?

A lot of (aspiring) developers wil rely on web API calls in order to create a new Bitcoin tool, service or platform. Not that there is anything wrong with that, but these API’s have so much underlying technology which isn’t used to its full potential by those developers. Furthermore, you are almost “forcing” the user to look at a certain “problem” through someone else’s eyes, which is not what Bitcoin and decentralization is all about.

One of the major drawbacks of relying on API calls for your coding masterpiece is the fact that these APIs don’t give you full access to everything Bitcoin technology has to offer. When learning to develop for Bitcoin from scratch, you will get access to far more possibilities than by relying  on a third party service. And there is a lot of technology and functions to learn about!

In order to “advance” to the next part of the book, readers will be presented with C# coding challenges which need to be completed successfully. These challenges will start off relatively easily by letting users create a private key, and the difficulty will increase over time. One of the more advanced challenges will be “how to implement a voting system with colored coins”.

The books written by Nicolas Dorier is the first of a three-part series, all of which will be published under the public domain. Feedback in regards to “Blockchain Programming in C#” part one is more than welcome in the official Bitcointalk thread. Overall, the feedback seems to be very positive so far, and I might try my hand at some of the challenges myself even though I am not a coder.

Website :

Book link : Programming in CSharp.pdf

Living Room / Happy New Year! =D
« on: December 31, 2014, 07:30 AM »
Happy New Year everyone!

If you like, tell us one of your resolutions for this year, or one of your goals.

One of my goals is to make our intercontinental move this year as smooth as possible.

Your turn!

Living Room / The Net Is Mightier Than The Sword
« on: December 25, 2014, 07:16 AM »
This is a presentation from one of my favourite journalists/analysts.

I was rather surprised to see him at a TEDx event though. He is definitely outside of the typical TED narrative, though he is greatly toned down in this presentation. (e.g. He's a fairly regular contributor on RT.)

But, the message will be familiar to many here, though perhaps a bit more focused than usual.

Everyone is familiar with sites that let you login with Google accounts, Facebook, Twitter, etc. That OAuth stuff.

This takes it to a new level where you can login without a 3rd party.

There's a lot of cool stuff in there, but I'll only paste one nifty snippet:

The other property it is important to highlight is a unique characteristic of the ECDSA signature verification algorithm. In most asymmetric cryptosystems, a function V(K, S, T) takes the public key, signature, and signed text as parameters and returns a simple true/false value indicating whether the signature is valid or not. This is the behavior of RSA, for example. In ECDSA, however, a verification function takes only two parameters, S and T, and returns K. The signature is valid if the returned K matches the signer’s public key. This is a significant difference, as both the client and server in the above Login protocol use signatures to recover the other party’s public key, which they then look up on the blockchain to determine the other party’s identity. In other words, the signature verification is not used to determine if the signature is valid, but to determine the identity of the other party.

Ok, 2:

Thus, given the semantic security of ECDSA and ECDH, the worst attack a malicious party with full control over the communication medium could leverage is denial of service.

And there's a Simple Machines Forum plugin!

tl;dr - A login system where YOU control your information, and not a 3rd party like Facebook.

Living Room / Slur you're going to hate it.
« on: December 24, 2014, 10:47 PM »
And the cryptoanarchists come out Wikileaks style with a decentralised information marketplace...

you're going to hate it.

Introducing Slur
Slur is an open source, decentralized and anonymous marketplace for the selling of secret information in exchange for bitcoin. Slur is written in C and operates over the Tor network with bitcoin transactions through libbitcoin. Both buyers and sellers are fully anonymous and there are no restrictions on the data that is auctioned. There is no charge to buy or sell on the Slur marketplace except in the case of a dispute, where a token sum is paid to volunteers.


The types of information we expect to see on the Slur marketplace ;

  •   Trade secrets.
  •   Designs for every type of consumer product.
  •   The source code for proprietary operating systems and high end CAD software.
  •   Zero day exploits. For the market defined value rather than a price determined by the corporations under the guise of a bounty with the veiled threat of legal action should the researcher choose to sell elsewhere.
  •   The details of backdoors covertly installed inside industrial and consumer hardware and software.
  •   Stolen databases. Corporations will no longer be able to get away with an apology when they fail to secure their customers confidential data. They will have to pay the market value to suppress it.
  •   Proof of tax evasion from disgruntled or underpaid employees. Both the IRS and the public have an interest in that information and the corporations will have to bid to suppress it - a very quantifiable and predictable payoff for the seller.
  •   Military intelligence relevant to real-time conflicts.
  •   Aerospace and defense designs.
  •   Evidence relevant to ongoing trials.
  •   Unflattering celebrity photos and videos.
  •   The complete databases of social media sites like facebook.
  •   Proof of government corruption. Close to an election.

More at the link.

Get your popcorn. Leaks are about to get very real.

For those that have noticed how YouTube view counts freeze at 301, you'll likely enjoy this as a fun little tour through some obscure Internet history.

tl;dw - They have to scrutinise video counts, and decided on a threshold to do it. i.e. 300. However, the code was:

Code: Text [Select]
  1. if (viewcount <= 300) { viewcount++; }
  2. else {...

So, 301 got counted.

It has nothing to do with number types or data size limits or anything like that.

This is pretty nifty. A HamWAN network, so, basically a network created by people independent of an ISP.

via /r/darknetplan -

Somebody was saying about Internet censorship? It reminds me a bit of Ghost Gunner in that the cat is out of the bag.

Living Room / The Pirate Bay and EZTV down
« on: December 11, 2014, 05:57 AM »
In a recent raid The Pirate Bay and EZTV as well as a few other sites were taken down.

For many years The Pirate Bay has been sailing by the seat of its pants so any downtime is met with concern from its millions of users.

This morning, for the first time in months, The Pirate Bay disappeared offline. A number of concerned users emailed TF for information but at that point technical issues seemed the most likely culprit.

However, over in Sweden authorities have just confirmed that local police carried out a raid in Stockholm this morning as part of an operation to protect intellectual property.

But of course, life goes on at (and many others).

In other news, rumour has it that The Pirate Bay is relocating to somewhere in South America. (I have no secondary confirmation on this yet.)




While there is still no sign of The Pirate Bay, another major torrent site is starting to recover following the police raid earlier this week. The popular TV-torrent distribution group EZTV is starting to upload new shows again as some of its servers come back online.

Earlier this week Swedish police raided a nuclear-proof data center built into a mountain complex in the city of Nacka.

The target of the raid was The Pirate Bay but collateral damage caused several other torrent sites to go down as well. This included EZTV, the go-to place for many torrenting TV fans.

After nearly two days of downtime EZTV is slowly starting to crawl back up. TF spoke to the EZTV crew who confirmed that several servers are up and running again and that the site’s services are coming back online.


Yeah, it's like that.

The main EZTV is still down for me, but it's up here:

Oh! Another mole! ;D

Living Room / Facebook alternative - Tsu
« on: December 10, 2014, 11:21 PM »
I came across this site and figured it might be of some interest to people. Check the FAQ. They run things very differently compared to Facebook.

Here's an invitation link:

You need an invitation to join.

They run ads, but pay out 90% of ad revenue to users.

This is just hilarious. Target and K-mart removed GTA V from the shelves in Australia after caving in to a petition about the game.

Now, there's a petition to remove Super Mario Bros.


Target Australia Must Remove All Super Mario Bros Games From Sale

Target Australia have shown that they, and their consumers, have the power to remove products from sale, especially video games, that are potentially harmful to people such as improperly-parented children and those with predisposed and medically diagnosable pathological disorders.

For years, Nintendo's Super Mario Bros series of computer games have used a colourful and friendly design and simplistic, repetitive structure to deliver a strong message of willful murder of wildlife, consumption of hallucenogenic flora and collection of income without declaration of tax.

As was the case with other drug-and-murder-simulators, like Grand Theft Auto 5, Target continues to sell these products in order to turn a profit without any thought as to the long-term effects to their consumers.

Just as with GTA5, we, the consumer, have the power to send a message to the big corporations to say that we're fed up with having to monitor what out children do, or deal with extreme cases of psychological break in adults who continue to use video games as a scapegoat.

So sign this petition, and make a difference.

Here's an article about GTA V being pulled:


Living Room / My 1-year Facebook Death-a-versary!!!
« on: December 01, 2014, 06:37 AM »
1 year ago today I killed myself off on Facebook and stopped posting entirely. No posts. No likes. No nothing. (I have been tempted, but have successfully resisted.)

Screenshot - 2014_12_01 , 11_21_43 PM.png

I'm wondering if I should do a zombie post...

Arrr... BRAINS!

Meh... maybe not.

I decided that I'm sick of the massive privacy intrusion and that I wouldn't cooperate any longer with it.

I'm not a product, and won't be sold as one.

I don't need "free" services or products. I'd rather just pay for them upfront.

I don't hate Facebook, but I just won't play that game.

Thank you for listening/reading. 8)

Feel free to join me & the virtual undead by posting your own FB obituary. ;)

Living Room / Rogers ISP in Canada launches MITM attacks on customers
« on: November 30, 2014, 07:34 PM »
This is rather interesting - an ISP attacking its customers:

rogers mitm.png

A security video on the topic:

See 3:31 in the video for another Rogers MITM attack.

The video goes into some good depth on how the ISP is attacking customers.

Here's one good post from the Reddit thread:

This is borderline criminal. They are modifying the content of a webpage that you are accessing. They are actively injecting their code in a page that you have requesting...

It's beyond a simple gaffe... If they wanted to, they could use this to change what's written in a article from the Globe & Mail or from the CBC...

When they start doing this, there is usually no end...

Now imagine if they decided to change any comment that they find damageable to their brand on twitter or facebook or reddit...

Now imagine they changed the prices on their competitor's website (Bell, Telus) to make them look more expensive than their own...

That's why everyone should always browse the net at the least in HTTPS... Wikipedia article on HTTPS

What you need to know is that HTTPS, when activated, creates an encrypted conduit between you and the webpage you are accessing. It also minimize the amount of information your ISP can intercept when you are browsing the net.

Whenever you do your banking or buying from a reputable site, HTTPS is enabled by default. You can also browse Reddit in HTTPS mode.

Everyone here should be using HTTPS Everywhere from the good people at the Electronic Frontier Foundation. INSTALL IT !

Living Room / Kim Dotcom is broke - US trying to revoke bail
« on: November 30, 2014, 03:24 AM »
The infinitely deep pockets of money printers has managed to drive Kim Dotcom broke:

Video: It's official. I'm broke. Here's a Q&A I did yesterday.


Kim Dotcom, the founder of the seized file-sharing site Megaupload, has declared himself "broke". The entrepreneur said he had spent $10m (£6.4m) on legal costs since being arrested in New Zealand in 2012 and accused of internet piracy. Mr Dotcom had employed a local law firm to fight the US's attempt to extradite him, but his defence team stepped down a fortnight ago without explaining why. Mr Dotcom said he would now represent himself at a bail hearing on Thursday. He denies charges of racketeering, conspiring to commit copyright infringement and money laundering. He told a conference in London, via a video link, that his lawyers had resigned because he had run out of money. "The [US authorities] have certainly managed to drain my resources and dehydrate me, and without lawyers I am defenceless," he said. "They used that opportunity to try and get my bail revoked and that's what I'm facing."

The entrepreneur said he had spent $10m (£6.4m) on legal costs since being arrested in New Zealand in 2012 and accused of internet piracy.

Mr Dotcom had employed a local law firm to fight the US's attempt to extradite him, but his defence team stepped down a fortnight ago without explaining why.

Mr Dotcom said he would now represent himself at a bail hearing on Thursday.

He denies charges of racketeering, conspiring to commit copyright infringement and money laundering.

He told a conference in London, via a video link, that his lawyers had resigned because he had run out of money.

"The [US authorities] have certainly managed to drain my resources and dehydrate me, and without lawyers I am defenceless," he told the audience at the Unbound Digital event.

"They used that opportunity to try and get my bail revoked and that's what I'm facing."

The law firm Simpson Grierson, which had represented Mr Dotcom, could not be reached for comment.

Political backlash

Mr Dotcom's declaration comes seven months after he won back access to about $750,000 worth of property - including several of his cars - that had been taken at the time of his arrest. However, other assets, including dozens of bank accounts, remained frozen.

Presented without comment so that other people can rant instead.  ;)


An internal document issued by IT experts working for the German federal government warned national agencies and companies not to use Windows 8. The reason? An alleged backdoor exploit has been discovered, and the details were obtained and published by German site Zeit Online. The leaked message suggests that the NSA likely has access to a hidden feature which apparently can’t be shut off and allows Microsoft to remotely control any computer running the software.

The Windows 8 feature under scrutiny by the German government is called Trusted Computing, a backdoor setting established ten years ago by a number of American tech giants including Microsoft, HP and IBM. Trusted Computing is supposed to protect computers from being manipulated by malicious third parties using viruses or other methods. The chip used to install Trusted Computing on Windows 8 computers allegedly offers Microsoft backdoor access, though the implication appears to be that the American company will extend that power to the U.S. government as well.

A second leaked report also notes that Windows 7 can “be safely operated until 2020,” implying that the German government may revert to the now-outdated operating system until the current security holes are plugged. However, in response to Zeit Online’s report, the Reichstag issued a statement partially denying claims it would downgrade its software.

Living Room / Please recommend a Canadian domain name registrar to me
« on: November 14, 2014, 11:55 PM »
I'm looking for recommendations of Canadian owned domain name registrars with a solid reputation.

Please DO NOT recommend an American registrar or any other. I am not interested. Canadian only. (Or possibly Australian if you know a really good Aussie registrar.)

Thanks in advance.

Developer's Corner / Any CentOS Security Gurus Here?
« on: November 14, 2014, 05:02 PM »
I need to harden a CentOS installation. Can someone point me to decent resources that will help me quickly get it hardened?

Please only respond if you are well experienced with CentOS or Linux security.

This is a bit bizarre. English language online retailers are blocking access from customers in Quebec. This isn't the ISP blocking, and it isn't the government forcing ISPs to block access, and it isn't some kind of a router-level blocking -- it's the retailers themselves blocking access due to language laws.


Either under pressure from Quebec’s language watchdog or on their own initiative, numerous English-only retail websites have blocked access to shoppers from Quebec, several Montreal news sources report.

CJAD radio reports that Williams-Sonoma, the upscale kitchen supplies retailer, is telling customers they have blocked access to their website because it runs afoul of Quebec’s language law.

The retailer reportedly told a customer the company ships to 87 different countries and “this is the first time we've ever had any problems.”

Williams-Sonoma owns a number of other retailers, including West Elm, Pottery Barn and Pottery Barn Kids, and all these sites are being blocked in Quebec at the moment, according to the Montreal Gazette.

Talk about chilling effects meeting the Twilight Zone.

This is a kick-ass article.

No quotes from it. It's just that good.

If you like spy-thriller novels, this is the real thing. You'll find it riveting.

If you are interested in security, at the end of the article the author posts a link for how to harden your security, protect privacy, and use strong encryption properly.

Enjoy!  :Thmbsup:

Developer's Corner / Patreon for software developers? (Crowd funding)
« on: October 17, 2014, 10:31 PM »
Anyone seen this before?

It's a kind of crowd funding for regular content creators.

From the FAQ:

Who can be a creator on Patreon?

Anyone can be a creator! If you have a passion to create awesome content for your fans, you can do it on Patreon. Creators are already making:

  • Youtube Videos & Channels
  • Web Comics
  • Blogs
  • Indie Games
  • Music
  • Articles
  • Podcasts
  • Animations
  • Illustrations
  • Photography
  • Anything you'd want to share!

It's got games there, so clearly there's a possibility, but I don't know if it would actually be practical for other devs.

Ideas? Thoughts?

Living Room / Who is your Favourite "Doctor"?
« on: October 05, 2014, 11:08 AM »
So, who is your favourite Doctor?

I'm firmly in this camp:

Don't click until you've voted!
Tom Baker

If you don't understand the question, please crawl out from under your rock. :P

Living Room / 3D Printed CAR!
« on: September 16, 2014, 06:47 AM »

Your 3D printed handgun (not included) goes in the glove compartment. :P

Your car has over 20,000 parts. Ours has 40.
The Strati: 44 hours of printing. 2 days of assembly.
Full-scale. Fully functional. Can we do it? Hell yeah.

This is a nifty gadget:

Everyone from professional photographers to Martha Stewart is using little quadcopter drones to take stunning landscape videos and aerial photographs. But if you’re a glass-half-empty type — or maybe just a shoot-that-drone-out-of-the-air type — there’s now a handy tech toy to defend you from unwanted surveillance.

An upcoming device called Cyborg Unplug will allow you to disrupt the connections of drones, Google glass, wireless microphones, and other devices to your WiFi connection. The project is led by Glasshole-hater Julian Oliver, and lists the dystopian ‘Stop the Cyborgs’ campaign as an inspiration and “conspirator.”

“Whether business office, restaurant, school or nightclub: it’s your territory and your rules, so make it harder for those that seek to abuse it,” the Cyborg Unplug site says.

The small device “sniffs the air” for the WiFi signatures of unwanted surveillance devices and automatically disconnects them from the network it’s assigned to protect. Cyborg Unplug will be up for sale in the $50 – $100 range on September 30. So far, it can’t interrupt Bluetooth connections, but they’re working on that.

Besides protecting your own network, the device also has an “All Out Mode” that can disconnect unwanted devices in range from every network they’re connected to, including tethered cellphones.

The trouble is, this is totally illegal in America. In the FCC’s own, unambiguous words:

We remind and warn consumers that it is a violation of federal law to use a cell jammer or similar devices that intentionally block, jam, or interfere with authorized radio communications such as cell phones, police radar, GPS, and Wi-Fi.

On the Cyborg Unplug site, they absolve themselves of all responsibility should you run into trouble with the law.

“We take no responsibility for the trouble you get yourself into if you choose to deploy your Cyborg Unplug in this mode,” the site says.

Drones? They’ve got your back. But when it comes to the Feds, you’re on your own.


Cyborg Unplug is a wireless anti-surveillance system for the home and workplace. 'Plug to Unplug', it detects and kicks devices known to pose a risk to personal privacy from your local wireless network, breaking uploads and streams. Detected devices currently include: Google Glass, Dropcam, small drones/copters, wireless 'spy' microphones and various other network-dependent surveillance devices.



Every wireless (WiFi) device has a unique hardware signature assigned to it by the manufacturer. These signatures are broadcasted by wireless devices as they probe for, connect to and use wireless networks.

Cyborg Unplug sniffs the air for these signatures, looking for devices its owner has selected to ban. If a banned device is discovered an alarm is triggered (LED, audio or message*). Further, if that device is found to be connected to a network that Cyborg Unplug is trained to guard, a stream of special 'de-authentication' signals (packets) are sent to disconnect it. It does this automatically, without any interaction required from its owner.

* Due to technical limitations, alarm features may be restricted to the high-priced model.

It is perfectly legal to block certain devices from using a network you control and administer. Some wireless routers allow an administrator to create blacklists, although generally they are limited to specific devices rather than an entire product. Cyborg Unplug is just as legal, differing only in that it takes a 'direct action' approach to wireless defense: a detect-and-disconnect routine, alarm system and an automatically updated list of devices able to be banned. Please see CAN IT BE USED TO DISCONNECT DEVICES FROM ANY NETWORK? below for more information.

No, not in any stretch of the word. A jammer disrupts all signal within a given (radio) band by flooding it with noise. Cyborg Unplug does not do this. Rather, it detects and targets a specific device and disconnects (only) it in turn by sending the same, legal, de-authentication packets a router sends when it disconnects a device.



In short yes. But be sure to read on to understand the implications...

Cyborg Unplug can be operated in two modes. The recommended mode is Territory Mode, disconnecting target devices from selected network(s) owned and operated by the user. The other mode is All Out Mode, which disconnects all detected target devices from any network they are associated with, including paired connections with smartphones. Please note that this latter mode may not be legal within your jurisdiction. We take no responsibility for the trouble you get yourself into if you choose to deploy your Cyborg Unplug in this mode.

More at the site.

From here:


Code: Text [Select]
  1. echo '
  2.    ___           _ __    __                     __             __        __  
  3.   / _ \___  ___ ( ) /_  / /  ___   ___ _  ___ _/ /__ ____ ___ / /  ___  / /__
  4.  / // / _ \/ _ \|/ __/ / _ \/ -_) / _ `/ / _ `/ / _ `(_-<(_-</ _ \/ _ \/ / -_)
  5. /____/\___/_//_/ \__/ /_.__/\__/  \_,_/  \_, /_/\_,_/___/___/_//_/\___/_/\__/
  6.                                         /___/                                
  7. '

I love stuff like this!  :-*

Living Room / Google playing dirty, or being a nice guy?
« on: September 08, 2014, 11:12 AM »
I'm sure a lot of people have noticed this, but if you visit a pay site you'll hit the paywall. However, if you hit the site through a Google search, you're good to go. Here's an example:

Search term: Queen ‘horrified’ that Scotland might go it alone


Google redirector:

Now, it's nice to get the whole article, but is this boosting Google when you use a Google redirector link for other people?

Has anyone tried this on other search engines?

Pages: prev1 2 3 [4] 5 6 7 8 9 ... 41next