Privacy & Security Goys
11.8K subscribers
432 photos
117 videos
28 files
623 links
"One well-known neo-Nazi channel that provides tradecraft to evade authorities online" –VICE News

"A great and important channel... performing probably one of the best forms of online activism" –Robert J. Corner
Download Telegram
Forwarded from Uncle Paul
Fash the ban.
The co-creator of this channel, has released a very well written PGP guide. The guide is aimed at helping those new to PGP. You’ll learn how to start using PGP to encrypt your messages and files and he even offers to help you practice your skills. In an attempt to cover costs and expand research we’re selling the 46 page guide for $6.88 USD we are only currently accepting Monero. If you’re interested contact me, OpSecGoy or email ghost_sec@mail2tor.com directly for details.
@TheBaseOfficial and @nsintelgroup have both self-destructed within 8 hours. It is unknown if they have been recently seized by adversaries or if they were subverted from the beginning, but I would highly recommend that you unsubscribe from them (and any other channel that is acting suspicious) lest you too become actively targeted by various glow-in-the-darks.

And as always, practice good OPSEC. I'm not sure why there's so many of you that are still using real pictures of yourself (allegedly) and have your real phone numbers unhidden from contacts.
As more information comes to light about The Base, it comes clear that there were some security issues. At least one member of an antifa group based in Eugene, Oregon had gotten access to their encrypted chatroom on Wire and leaked screenshots to the media and law enforcement. One of their conversations discussed a "training camp" for new recruits in the neighboring Washington state area. Media influence put pressure on local sheriff Brad Manke to contact the FBI and SPLC for help. Manke later confirmed to a "SPLC researcher" that 30 acres of land was purchased by a Delaware LLC called "Base Global" – minimal investigation revealed tax affidavits associated with the property purchase lead to a man named Rinaldo Nazzaro, who is now the primary suspect of running The Base.

What can we learn from this?
The biggest issue we can see from this investigation is that Nazzaro mixed his identities. Nazzaro purchased the property under a name so similar to The Base while having his own personal identity tied to it. If he had used a different company's name that was suitable to the environment, like Bob's Lumber, such a connection would've been harder to make. Having the property in his own name would have been less suspicious than BASE GLOBAL, especially when they were actively recruiting. Even if there was never an antifa rat in their chat, sooner or later this fatal move would have come back to haunt Nazzaro.

The second problem was the antifa mole. Properly vetting members (meeting in-person and doing certain activities only dedicated people would do to gain trust in one another) before granting access to any sort of chatroom is one way of doing this. And of course, the less you say, the less evidence will be used against you. Crazy lifehack: not discussing potential crimes is a good way to avoid being jailed for life as a political prisoner. Not having a group that discusses, encourages, and plans domestic terrorism is another awesome trick.

On the plus side, they did use an encrypted messaging service. Logs weren't leaked from their servers from rogue employees (Discord comes to mind). Encryption is utilized for a reason.

Moving forward:
1) If you're going to buy property to train combatants against a powerful System with near-infinite resouces that seeks to destroy you and your race, don't make sloppy mistakes like listing your explicitly violent organization as the owner of the property while having its corresponding tax affidavits in your real name.
2) You can't have your organization infiltrated if you don't have an organization to begin with - acting solo or in small cells of trusted people is far harder to infiltrate. This isn't to say you shouldn't network or even join a pro-White organization, but avoid groups that fed/siegepost like the plague.
3) Encryption works, and every goy who wants to ensure their communications are safe from spooks should contact @OpSecGoy here on Telegram or email Ghost at ghost_sec_goy@protonmail.com for details on getting our organization's guide on PGP encryption. 😎

(Guardian article)
There has been a lot of talk about PGP/GPG lately. Most people tend to use the default RSA algorithm when generating a keypair within GPG, which is fine so long as you're generating an adequetly sized key, typically 4096-bit today. However, if you're like me and you use GnuPG 2.1.x from the terminal you can easily create keypairs that use Elliptic-curve cryptography (ECC). These keys tend to have better performance and are shorter in length while still offering comparable security.
Note: You may run in to compatibility issues if you're not running newer software so be aware of that.
https://www.gniibe.org/memo/software/gpg/keygen-25519.html
👍1
If you live in the United States and you are given the choice between a password or biometric authentication to secure your device(s), always opt for the password. This is because of court rulings establishing protection for passwords but not for biometrics.
Read more here: https://www.privateinternetaccess.com/blog/2019/04/biometrics-are-not-protected-in-the-united-states-court-case-reaffirms/
I want you to think about this article. The FBI – that is funded by American tax dollars – believes that people of European descent who wish to have a country of their own people are on par with ISIS.

Let's ignore the fact that ISIS is as jewish-controlled as the White House for a second. Assume you buy the media narrative that ISIS is a radical Moslem terrorist group that just happens to attack every country but Israel. The FBI, as an arm of the jewish power structure, has now deemed young fashy goys like you equal to (if not a greater threat than) men who televise the butchering and dismemberment of their victims.

You're funding a System that wants to see you dead. You need to improve your operational/personal security, and fast. It's past the point for any debate. There is no political solution.

It's time to use programs and security policies once reserved for Onion Land drug dealers and government whistleblowers. Use pedophiles as canaries in the coal mine – if it's a safe place for people as vile as them, it's probably a good start for us. Use Tails. Use PGP and full-disk encryption. Use a valid, trustworthy VPN and Tor. Use some self control and don't blab about your online activities offline and vice versa.

Are you getting this through your skull? If you want a future for White children, allow me to reiterate: YOU ARE CONSIDERED AS MUCH OF A THREAT TO THE U.S. GOVERNMENT AS ISIS.

Time to start acting like it.
Archive link (to prevent Vice from tracking the readers of their article): http://archive.is/asfP4
Original link courtesy of @prowhitefam
Now you can easily spoof your MAC address with our open source easy to use script. It is less than 15 lines of bash and it doesn't require any odd dependencies. All you need is a modern linux distro. Check it out here: https://gitlab.com/opsecgoy/mac-spoofer
Our new V3 Onion service is now up and running. Please bookmark it. This will be the new link moving forward: http://goysec74znsyewq3nu2i3kmwozxptc3lx22jg67km6r2we37ejiaz5yd.onion
Some research resources that could come in handy for purely educational and theoretical purposes:

Facebook Ad Library
https://www.facebook.com/ads/library/?active_status=all&ad_type=political_and_issue_ads&country=US
The Ad Library provides advertising transparency by offering a comprehensive, searchable collection of all ads currently running from across Facebook Products. Anyone can explore the Library, with or without a Facebook account. This can be used to see where advertising is being used to attract and coordinate Antifa.

SnapStory
https://github.com/sdushantha/SnapStory
Scrape public stories from Snapchats. Useful for gathering intelligence on Antifa nodes using Snapchat.

Entro.py
https://github.com/andrew-vii/Entro.py
Monitors chat status activity of Facebook users to know when they are on their device and when they are not.

InstaLooter
https://github.com/althonos/InstaLooter
Quickly scrape all Instagram photos from a person.

SpiderFoot
https://www.spiderfoot.net/
SpiderFoot is a reconnaissance tool that automatically queries over 100 public data sources to gather intelligence on IP addresses, domain names, e-mail addresses, names and more. When combined with basic emoji replacement attacks (self-hosted images used in private chats that look like an emoji but give you the IP address of people who see them), this can be incredibly useful at identifying people from an IP address alone.

Face Recognition
https://github.com/ageitgey/face_recognition
Useful when paired with image scrapers to identify people in videos and images.

linkedin2username
https://github.com/initstring/linkedin2username
Generate username lists from companies on LinkedIn.

Universal Reddit Scraper
https://github.com/JosephLai241/Universal-Reddit-Scraper
This is a universal Reddit scraper where you can manually specify subreddits to scrape, specify which category of posts to scrape for each subreddit, and how many results are returned.

Twint
https://github.com/twintproject/twint
Twint is an advanced Twitter scraping tool written in Python that allows for scraping Tweets from Twitter profiles without using Twitter's API.

Citadel
https://github.com/jakecreps/Citadel
Curated list of vetted and useful OSINT tools.

PwnBin
https://github.com/kahunalu/pwnbin
PwnBin is a webcrawler which searches public pastebins for specified keywords.

Sherlock
https://github.com/sherlock-project/sherlock
Find a username across multiple social media networks.

SkipTracer
https://github.com/xillwillx/skiptracer
Get basic PII on a target from paywall sites.

Graph Commons
https://graphcommons.com/
A useful tool to build graphs that detail and share the relationships between people, organizations, and data.

Milanote
https://milanote.com/
A useful tool to build graphs that also lets you link to other public Milanote graphs.

Draw.io
https://draw.io/
A basic diagramming tool.

GeoCreepy
https://www.geocreepy.com
A Geolocation OSINT Tool. Offers geolocation information gathering through social networking platforms.

Intelligence X
https://intelx.io
NSA-Like Search Tool for darknet and archives.

Buscador Investigative Operating System
https://inteltechniques.com/buscador/index.html
An OS focused on OSINT

Maltego CE
https://www.paterva.com/buy/maltego-clients/maltego-ce.php
Maltego is an interactive data mining tool that renders directed graphs for link analysis. The tool is used in online investigations for finding relationships between pieces of information from various sources located on the Internet.

RawGraphs
http://app.rawgraphs.io/
Primarily conceived as a tool for designers and vis geeks, RAW Graphs aims at providing a missing link between spreadsheet applications (e.g. Microsoft Excel, Apple Numbers, OpenRefine) and vector graphics editors (e.g. Adobe Illustrator, Inkscape, Sketch).

[1/2]
SIPRI Arms Trade Register
http://armstrade.sipri.org/armstrade/page/trade_register.php
SIPRI is an independent international institute dedicated to research into conflict, armaments, arms control and disarmament. Established in 1966, SIPRI provides data, analysis and recommendations, based on open sources.

Camopedia
http://camopedia.org/index.php?title=Main_Page
The Camopedia site is a living document, providing a comprehensive, accurate, and academically-supported database referencing all of the major military and paramilitary camouflage patterns that have been in use around the world since the beginning of the 20th century. This reference is available as a free resource for historians, government agencies, military personnel, collectors, artists & designers, airsoft & MILSIM enthusiasts, military modelers, and all others with an interest in camouflage design, development, and history.

Human Trafficking Flow Map
http://dataviz.du.edu/projects/htc/flow/
Visualization design and development by the Center for Statistics and Visualization at the University of Denver.

PDFmyURL
http://pdfmyurl.com
Let your visitors turn web pages into PDF with a single click!

SpoonBill
http://spoonbill.io/
Spoonbill lets you see profile changes from the people you follow on Twitter.

[2/2]
In light of the recent deplatforming attempts of several prominent channels, I'd like to encourage everyone to submit their public pgp key and email address to our onion service. You can forward this to me or @opsecgoy to have your contact information added to our website.

Remember that Telegram is only a temporary home for us. We need a viable backup/alternative for communicating and networking online, and we will be forced to leave the clearnet sooner or later. The jews and their anti-White henchmen inside and outside the government will never stop trying to silence us.

Don't be that loser goy who doesn't have a boog buddy when the System comes for us once and for all!

http://goysec74znsyewq3nu2i3kmwozxptc3lx22jg67km6r2we37ejiaz5yd.onion
Those that speak ill will towards our success are either subversives or insecure losers who cannot, and never will, produce anything of value for our people. In doing so they do the only thing they know to do: make themselves appear weak and pathetic by sniveling and nay saying in the shadows. They lash out like children who didn’t get their way whenever they see ideas taking shape and becoming great and valuable. Attempting to put brothers against one another is the ancient Jewish tactic they seek to use in their quest for fame and friends. They will instead forever be stuck sitting on the sidelines seeking the attention of those who are doing and improving our condition. They will be buried under the dust of our hard work. To my brothers out there helping and improving our condition and to those who have supported and continue to support us, hail victory we appreciate you all! To those laughing behind our backs and sneering at our work, I have taken notice.
Lately there have been a lot of posts creating hype about a really old issue dealing with ProtonMail. The claim being made is that Israel is spying on all the traffic that goes through ProtonMail due to their relationship with Radware, the worlds leading provider of DDoS solutions. The implication being that Israel can read everything you’re saying. This is simply not true. If you read the article in its entirety (not just the highlighted part) you’ll begin to understand a little more how their DDoS protection works. I encourage you to read the article fully. And remember to access your boog mail account securely and privately.
1. Encrypt your email yourself.
2. Access your email over a connection not linked to you ie. VPN/Tor
3. Access your email with a device you don’t use for anything normie tier.

Here’s the full article in question.

https://protonmail.com/support/knowledge-base/protonmail-israel-radware/

Read it yourself. If you need to email me I can be reached at opsecgoy@protonmail.com until a real issue with this mail provider arises.
👏1