Privacy & Security Goys
11.8K subscribers
432 photos
117 videos
28 files
623 links
"One well-known neo-Nazi channel that provides tradecraft to evade authorities online" –VICE News

"A great and important channel... performing probably one of the best forms of online activism" –Robert J. Corner
Download Telegram
Using apps on your phone to spoof your location can be useful in tandem with a VPN, especially when both locations and your device's time match up.

Phones are inherently not private or secure, and troves of data are accessible for anyone with access to your device. However, removing your SIM card, utilizing a trustworthy VPN, and spoofing your device's location are all great ways to increase user privacy, especially if you have creepy apps like Snapchat or Facebook installed that blatantly spy on you. Getting rid of these datamining apps is ideal, but providing false information (disinfo) is the next best thing.
Most everyone has heard of Ross Ulbricht but not as many understand how he got caught running the first darknet market. Studying these errors can help you advance your own opsec.

https://chown.io/decrypt-ross-ulbricht-silk-road/
If any of you are crazy enough to be going to the big setup in Virginia today make sure you leave your normie cell phone far far away.
There could be IMSI catchers present. These are gadgets that pretend to be cell towers. Your phone logs in to it and details are logged and forwarded to a real cell tower.
Regardless, your cell carrier will know you were there. If you don’t want it known, don’t take your phone. If you must have communications pick up a burner nearby and pitch it before you go home.
Hail Victory!
🔥1
Given the latest Apple section 1.1.1 crackdowns on like minded Telegram accounts, I just want to remind everyone this is why we have created our onion service: http://goysecquje667cky.onion

Make sure you bookmark it so you can find your way back to the community.

Next, you can get around the Apple ban by using the web app for Telegram at https://web.telegram.org
We have been featured and practically endorsed by the New Delhi Times. The article which I had assumed would be a hit piece on evil white supremacist Nazis turned out to be a decent take on our group and what we’re trying to do.
I hope y'all arent using iOS (or preinstalled android for that matter) on your phone, but this should help you get all of your favourite spicy channels
Forwarded from Uncle Paul
Fash the ban.
The co-creator of this channel, has released a very well written PGP guide. The guide is aimed at helping those new to PGP. You’ll learn how to start using PGP to encrypt your messages and files and he even offers to help you practice your skills. In an attempt to cover costs and expand research we’re selling the 46 page guide for $6.88 USD we are only currently accepting Monero. If you’re interested contact me, OpSecGoy or email ghost_sec@mail2tor.com directly for details.
@TheBaseOfficial and @nsintelgroup have both self-destructed within 8 hours. It is unknown if they have been recently seized by adversaries or if they were subverted from the beginning, but I would highly recommend that you unsubscribe from them (and any other channel that is acting suspicious) lest you too become actively targeted by various glow-in-the-darks.

And as always, practice good OPSEC. I'm not sure why there's so many of you that are still using real pictures of yourself (allegedly) and have your real phone numbers unhidden from contacts.
As more information comes to light about The Base, it comes clear that there were some security issues. At least one member of an antifa group based in Eugene, Oregon had gotten access to their encrypted chatroom on Wire and leaked screenshots to the media and law enforcement. One of their conversations discussed a "training camp" for new recruits in the neighboring Washington state area. Media influence put pressure on local sheriff Brad Manke to contact the FBI and SPLC for help. Manke later confirmed to a "SPLC researcher" that 30 acres of land was purchased by a Delaware LLC called "Base Global" – minimal investigation revealed tax affidavits associated with the property purchase lead to a man named Rinaldo Nazzaro, who is now the primary suspect of running The Base.

What can we learn from this?
The biggest issue we can see from this investigation is that Nazzaro mixed his identities. Nazzaro purchased the property under a name so similar to The Base while having his own personal identity tied to it. If he had used a different company's name that was suitable to the environment, like Bob's Lumber, such a connection would've been harder to make. Having the property in his own name would have been less suspicious than BASE GLOBAL, especially when they were actively recruiting. Even if there was never an antifa rat in their chat, sooner or later this fatal move would have come back to haunt Nazzaro.

The second problem was the antifa mole. Properly vetting members (meeting in-person and doing certain activities only dedicated people would do to gain trust in one another) before granting access to any sort of chatroom is one way of doing this. And of course, the less you say, the less evidence will be used against you. Crazy lifehack: not discussing potential crimes is a good way to avoid being jailed for life as a political prisoner. Not having a group that discusses, encourages, and plans domestic terrorism is another awesome trick.

On the plus side, they did use an encrypted messaging service. Logs weren't leaked from their servers from rogue employees (Discord comes to mind). Encryption is utilized for a reason.

Moving forward:
1) If you're going to buy property to train combatants against a powerful System with near-infinite resouces that seeks to destroy you and your race, don't make sloppy mistakes like listing your explicitly violent organization as the owner of the property while having its corresponding tax affidavits in your real name.
2) You can't have your organization infiltrated if you don't have an organization to begin with - acting solo or in small cells of trusted people is far harder to infiltrate. This isn't to say you shouldn't network or even join a pro-White organization, but avoid groups that fed/siegepost like the plague.
3) Encryption works, and every goy who wants to ensure their communications are safe from spooks should contact @OpSecGoy here on Telegram or email Ghost at ghost_sec_goy@protonmail.com for details on getting our organization's guide on PGP encryption. 😎

(Guardian article)
There has been a lot of talk about PGP/GPG lately. Most people tend to use the default RSA algorithm when generating a keypair within GPG, which is fine so long as you're generating an adequetly sized key, typically 4096-bit today. However, if you're like me and you use GnuPG 2.1.x from the terminal you can easily create keypairs that use Elliptic-curve cryptography (ECC). These keys tend to have better performance and are shorter in length while still offering comparable security.
Note: You may run in to compatibility issues if you're not running newer software so be aware of that.
https://www.gniibe.org/memo/software/gpg/keygen-25519.html
👍1
If you live in the United States and you are given the choice between a password or biometric authentication to secure your device(s), always opt for the password. This is because of court rulings establishing protection for passwords but not for biometrics.
Read more here: https://www.privateinternetaccess.com/blog/2019/04/biometrics-are-not-protected-in-the-united-states-court-case-reaffirms/
I want you to think about this article. The FBI – that is funded by American tax dollars – believes that people of European descent who wish to have a country of their own people are on par with ISIS.

Let's ignore the fact that ISIS is as jewish-controlled as the White House for a second. Assume you buy the media narrative that ISIS is a radical Moslem terrorist group that just happens to attack every country but Israel. The FBI, as an arm of the jewish power structure, has now deemed young fashy goys like you equal to (if not a greater threat than) men who televise the butchering and dismemberment of their victims.

You're funding a System that wants to see you dead. You need to improve your operational/personal security, and fast. It's past the point for any debate. There is no political solution.

It's time to use programs and security policies once reserved for Onion Land drug dealers and government whistleblowers. Use pedophiles as canaries in the coal mine – if it's a safe place for people as vile as them, it's probably a good start for us. Use Tails. Use PGP and full-disk encryption. Use a valid, trustworthy VPN and Tor. Use some self control and don't blab about your online activities offline and vice versa.

Are you getting this through your skull? If you want a future for White children, allow me to reiterate: YOU ARE CONSIDERED AS MUCH OF A THREAT TO THE U.S. GOVERNMENT AS ISIS.

Time to start acting like it.
Archive link (to prevent Vice from tracking the readers of their article): http://archive.is/asfP4
Original link courtesy of @prowhitefam
Now you can easily spoof your MAC address with our open source easy to use script. It is less than 15 lines of bash and it doesn't require any odd dependencies. All you need is a modern linux distro. Check it out here: https://gitlab.com/opsecgoy/mac-spoofer
Our new V3 Onion service is now up and running. Please bookmark it. This will be the new link moving forward: http://goysec74znsyewq3nu2i3kmwozxptc3lx22jg67km6r2we37ejiaz5yd.onion
Some research resources that could come in handy for purely educational and theoretical purposes:

Facebook Ad Library
https://www.facebook.com/ads/library/?active_status=all&ad_type=political_and_issue_ads&country=US
The Ad Library provides advertising transparency by offering a comprehensive, searchable collection of all ads currently running from across Facebook Products. Anyone can explore the Library, with or without a Facebook account. This can be used to see where advertising is being used to attract and coordinate Antifa.

SnapStory
https://github.com/sdushantha/SnapStory
Scrape public stories from Snapchats. Useful for gathering intelligence on Antifa nodes using Snapchat.

Entro.py
https://github.com/andrew-vii/Entro.py
Monitors chat status activity of Facebook users to know when they are on their device and when they are not.

InstaLooter
https://github.com/althonos/InstaLooter
Quickly scrape all Instagram photos from a person.

SpiderFoot
https://www.spiderfoot.net/
SpiderFoot is a reconnaissance tool that automatically queries over 100 public data sources to gather intelligence on IP addresses, domain names, e-mail addresses, names and more. When combined with basic emoji replacement attacks (self-hosted images used in private chats that look like an emoji but give you the IP address of people who see them), this can be incredibly useful at identifying people from an IP address alone.

Face Recognition
https://github.com/ageitgey/face_recognition
Useful when paired with image scrapers to identify people in videos and images.

linkedin2username
https://github.com/initstring/linkedin2username
Generate username lists from companies on LinkedIn.

Universal Reddit Scraper
https://github.com/JosephLai241/Universal-Reddit-Scraper
This is a universal Reddit scraper where you can manually specify subreddits to scrape, specify which category of posts to scrape for each subreddit, and how many results are returned.

Twint
https://github.com/twintproject/twint
Twint is an advanced Twitter scraping tool written in Python that allows for scraping Tweets from Twitter profiles without using Twitter's API.

Citadel
https://github.com/jakecreps/Citadel
Curated list of vetted and useful OSINT tools.

PwnBin
https://github.com/kahunalu/pwnbin
PwnBin is a webcrawler which searches public pastebins for specified keywords.

Sherlock
https://github.com/sherlock-project/sherlock
Find a username across multiple social media networks.

SkipTracer
https://github.com/xillwillx/skiptracer
Get basic PII on a target from paywall sites.

Graph Commons
https://graphcommons.com/
A useful tool to build graphs that detail and share the relationships between people, organizations, and data.

Milanote
https://milanote.com/
A useful tool to build graphs that also lets you link to other public Milanote graphs.

Draw.io
https://draw.io/
A basic diagramming tool.

GeoCreepy
https://www.geocreepy.com
A Geolocation OSINT Tool. Offers geolocation information gathering through social networking platforms.

Intelligence X
https://intelx.io
NSA-Like Search Tool for darknet and archives.

Buscador Investigative Operating System
https://inteltechniques.com/buscador/index.html
An OS focused on OSINT

Maltego CE
https://www.paterva.com/buy/maltego-clients/maltego-ce.php
Maltego is an interactive data mining tool that renders directed graphs for link analysis. The tool is used in online investigations for finding relationships between pieces of information from various sources located on the Internet.

RawGraphs
http://app.rawgraphs.io/
Primarily conceived as a tool for designers and vis geeks, RAW Graphs aims at providing a missing link between spreadsheet applications (e.g. Microsoft Excel, Apple Numbers, OpenRefine) and vector graphics editors (e.g. Adobe Illustrator, Inkscape, Sketch).

[1/2]