Ramiro Romani's neo-network
802 subscribers
397 photos
194 videos
4 files
936 links
founder of @takebackourtech,
part of freedcomcells.org, thegreaterreset.org

neo: a new or revived form of.

Break free of the former internet. Daily posts & content that teach you new revolutionary technologies.
Download Telegram
Did you attend the first The Greater Reset Activation?

The Greater Reset Team (myself included) is hard at working getting the site up for the next conference, which will take place the last week in May!

Last time we had 30+ speakers share their thoughts over 5 days over critical topics such as a food, commerce, technology, and health.

This year we want to make the event even more interactive, and showcase our community.

I'd like to hear your ideas:
- Who do you want to see speak at the next The Greater Reset?
- How would you like to interact with the live community at the event?
- How will you invite friends & neighbors to set up watch parties?

Peace and love ❀️
Announcing The Next Greater Reset
@neo_network

πŸŒ™πŸŒ™πŸŒ™

We've launched our systems for the second 'The Greater Reset: Activation', which will take place May 25th - 29th on thegreaterreset.org

Check out the videos on the site and watch them! I think I have a talk up there somewhere ;)

The Greater Reset Activation is the world’s collective response to the World Economic Forum’s Initiative: The Great Reset.

We offer an alternative to the WEF’s top-down, centralized, authoritarian vision. Our desire is to help all people find community and liberty by providing practical steps and knowledge for co-creating a world that respects individual liberty, bodily autonomy, and choice.

We invite you to join us for 5 days of discussion about the diverse opportunities available for those who seek to live in harmony with humanity and the planet, while respecting our innate freedom.
What's one thing you've done to become digitally conscious?

Since I became interested in privacy, I started reading through the Terms of Service when signing up for new softwares (especially free ones). Even skimming through the important sections the data collection and privacy policies really helps. When I'm working on something sensitive, reading through this can deter my decision of using that product. If its just normal use, then at least I am aware of who is listening. πŸ™Š
Hey, am looking to get informed opinions on the Ethereum ecosystem. Some of their partnerships with JP Morgan and big banks, as well the UNICEF projects that distribute ETH to warn torn areas have me thinking that its a limited hangout and potentially the coin of the deluded world order.

Anyone have any news or information to share on this?
🀯

I'll be releasing a new article tomorrow evening titled 'Internet Apocalypse'. We're going to dig into how internet censorship works, what laws have been passed that allow it to happen, and the players driving censorship forwards.

Is a horrifying reality approaching where our favorite sites / content creators go missing from the web? If it is - how can we resist?

We'll answer these questions and more on the @neo_network!
Share with your peeps and chat with us at @neo_network_chat ❀️
Forwarded from Rachel Blevins
Media is too big
VIEW IN TELEGRAM
NEW: The IRS is launching Operation Hidden Treasure, a new program targeting cryptocurrency users who haven't reported their earningsβ€”as cryptos reach an all-time high and the IRS looks to get its cut…
The IRS are trying to posture. If you don't have an identity tied to your wallets, you will be safe. This is why we use non-custodial wallets. This is why we keep our money off exchanges. This is why we should not convert our crypto to fiat and exchange it directly for goods & services. We'll have a platform to do this soon ;)
Do you have a suggestion for a speaker for the next Greater Reset Activation?

Use this link to submit: https://thegreaterreset.org/nominate-a-speaker/
Are We On The Brink Of An Internet Apocalpyse: Part I
@neo_network
πŸŒβ˜„οΈπŸ€―

Since 2020 we've become aware of the growing pressure to homogenize discussion across the internet on key issues - all for our safety of course.

The major players in Internet 2.0 have take huge steps to moderate their platforms:

- Youtube removed over 2M channels between January & March 2020 alone
- Twitter has suspended a million accounts in the first half of 2020
- Facebook took action on over 100M+ pieces of content across Q3 and Q4 of 2020,

Although these platforms claim to be upholding common morals rather than subjective guidelines, they do not provide any transparency below aggregate statistics. This leaves plenty of room for truthful content & users to get removed and lumped in with these ban waves. One such case that comes to mind is The Conscious Resistance, which had 150K subscribers in October 2020. It had multiple videos deleted with interviews of doctors talking about the benefits Vitamin C, which eventually led to the channel being taken down entirely.

My point is that it is too hard to tell who is actually getting banned without being a part of the banned groups themselves. There is no independent listing for people to make the case for their channels outside the platforms themselves.

As this pressure has increased, the individuals who valued the right to dissent naturally moved towards alternative platforms where they could communicate freely.

And these alt-media platforms have continued to disappoint us, like Bitchute - which has become overrun with far-right & hateful media channels that kill the signal to noise ratio and stink of a limited hangout. And there are even reports of Bitchute terminating channels (which you can really only hear about if you follow the content creator directly)

This process seems to repeat in a perpetual search of alternative-to-the-alternative platforms. Rather than rely on aggregators (which are convenient), we as truth seekers should interact directly with our content creators.

Still, the nightmare scenario is waking up one day to find our favorite sites de-listed from the internet entirely.

In this 2 part series, I wanted to explore if this nightmare scenario is possible, and what it might look like - to give us a better chance of protecting ourselves:

We need to explore three things:

1. What does the judicial precedent look like for the de-listing of domains on the internet?
2. Why did it happen, for what purposes, and at what scale?
3. How does the seizure of a domain work?

You're In Our Sites

The first major thing to know, is that domain seizures started becoming commonplace in 2010, and operation have continued to ramp up every year since then, all across the world - but mainly in the United States & EU.

There were two laws that served as legal basis for these seizures:

- PRO-IP Act of 2008, which increased civil & criminal penalties for copyright infringement, and was used by record labels & recording agencies to sue individuals for sharing copyrighted material
- The civil forfeiture provision (2323) of Title 18 U.S Criminal Code which amended the PRO-IP act, and allowed the agencies conducting these operations to seize domains, goods, and money from targeted operations.

The National Intellectual Property Rights Coordination Center is a joint-task force agency led by U.S Immigration and Customs Enforcement (ICE). These two organization launched Operation In Our Sites in 2010. This operation β€˜targets websites and their operators that distribute counterfeit and pirated items over the Internet, including counterfeit pharmaceuticals and pirated movies, television shows, music, software, electronics, and other merchandise as well as products that threaten public health and safety’.

This global organization encompasses 24 US & international agencies ranging from agencies in multiple branches of the US armed forces, the postal service, and international law enforcement agencies like Europol, and more.
Year after year, NIPRCC & ICE have come up with cute names for their operations to go after sites that sell counterfeit goods. This started at a small scale at first, with tens to a few hundred domain names being seized, and then grew in size after operation Transatlantic, which seized close to 30,000 domain names.

The latest operation which has been publicly released actually seized over a million websites. Again, they target copyright-infringing sites that sell various fake goods which can range from counterfeit clothing to counterfeit airplane parts.

Though only around 33K websites were criminally seized (transferred into the hands of Homeland Security), an additional 1.21 domain names were civilly seized by β€˜industry partners'.

What β€˜civilly’ seized means isn't fully explained, but one could surmise that the internet service providers or domain registrars for those zones took measures to strip ownership from the targeted sites.

There aren't any details about the monetary seizures from these new operations, but in past operations we've seen sums of up to 1M seized from the criminal organizations.

Is there a monetary incentive for these agencies to conduct seizures? How much have they seized from the latest operations?

Either way, I'm not sure how much safer I feel being protected from the horrors of the counterfeit basketball jersey industry. πŸ€πŸ—‘

How Does This Work?

Now that we're aware that this happens at a large scale, and why it may occur, let's discuss how it happens.

First of all, the entire seizure process happens before a trial even takes place. This is allowed through the US forfeiture laws (mentioned earlier in this article).

In the case of these copyright domain seizures, a magistrate judge can grant a seizure warrant based on probable cause. (and they can be convinced to do this based on in-person testimony / hearsay).

Here's an example of one of these seizure warrants in the 2018 takedown of ToKnowAll by the FBI. The request was sent in on Tuesday and was granted the next day.

The process is actually simple and outlined in the warrant itself.

1. The government agency finds the domain registrar hosting the target domain, which must be under its jurisdiction.
2. The Magistrate Judge must find probable cause a crime has been committed and agree on the seizure.
3. The agency then serves the registrar with a seizure warrant, in which the registrar is required to shift registration of that domain to the agency

Is This Even Effective?

By now you must realize that this doesn't actually scrub the content off the internet, it merely makes it inaccessible by its domain name. New domains can be registered in its place, and the IP address can be even be bookmarked by individuals for later use.

Additionally, this domain seizure practice is heavy handed and can be inaccurate. The Center for Democracy & Technology pointed out one case of mistaken seizure targeting a parent domain of thousands of other individual & separate sites.

There's even been instances of the operating taking down legal sites in foreign countries. In 2011, ICE seized a domain from RojaDirecta, a sports streaming site which was declared legal in Spain. A international legal battle ensued which led ICE to give it back.

We must wonder why we allow these practices to continue. It is wrong to have domains seized on β€˜probable cause’ without due process. It happens without warning from the owners, and destroys the value of the domain by directing users to splash pages accusing the owners of crimes.

In the second & final part of this article, we will discuss how countries like China implement country-wide censorship and how individuals & developers can utilize old & new technologies to avoid being walled in.

🧱🧱🌀
Read more at @neo_network
Discuss with digital warriors at @neo_network_chat
Forwarded from NoGoolag
How the Russian government accidentally blocked its own websites

Reminder: Internet censorship can have unintended consequences.

Russian internet users began noticing something strange on Wednesday: a number of websites, including the Kremlin’s own Kremlin.ru, were down. Just hours earlier, Roskomnadzor, the Russian government body overseeing communications and technology, announced that it was purposely slowing down access to Twitter, claiming the company had allowed over 3,000 posts featuring suicide, child exploitation, and drug use to remain up in violation of Russian law.

But the outage that followed affected far more than just the social media site, including domains like Reddit.com and Microsoft.com. The Russian government appears to have bungled its latest attempt at internet censorship, accidentally blocking its own websites in the process. And this isn’t even the first time it’s made a similar mistake in the last few years.

β€œWith the aim of protecting Russian citizens and forcing the internet service to follow the law on the territory of the Russian Federation, centralized responses have been taken against Twitter starting March 10, 2021 β€” specifically, the initial throttling of the service’s speeds, in accordance with the regulations,” Roskomnadzor said in a statement.

https://restofworld.org/2021/how-the-russian-government-accidentally-blocked-access-to-its-own-websites/

#russia #censorship
image_2021-03-11_19-49-12.png
383.8 KB
freedomcells.org isn't blocked in China! I wonder how we can invite more people from PRC.
Another late night of researching & writing. I've almost finished with this article but I am not satisfied with the solution section. I'd like more time to test the solutions myself and relay the instructions back to y'all. I'll postpone Pt. II of this article until tomorrow then.

Cheers :)
Wanting to get some feedback on article format, what type of article are you most likely to READ & SHARE?
Anonymous Poll
54%
Shorter section of article under 300 words
16%
Headlines / short teasers with pictures
30%
Long-form articles spanning multiple long messages with links
Are We On The Brink Of An Internet Apocalypse: Part 2
@neo_network
πŸŒβ˜„οΈπŸ€―

What originally was a two part article has turned into a three part article. I've taken feedback from readers and decided to break these articles up into more manageable chunks, i.e: daily posts that are actually digestible.

Another change I'd like to make, is rather than just providing information around the subject of research, I'd also like to provide step by step walk-throughs that can be used to protect yourself. So although content will take longer to get out, it'll be more valuable to us.

The solution part of this series will be in part 3 - so stay tuned. :)

In the first part of this series, we explore how western powers conduct domain seizures to protect the world from dastardly counterfeiters. Ironically enough, the leading counterfeiters reside in the People's Republic of China, which maintains one of the largest & most sophisticated censorship networks in the world.

We lovingly refer to this system as the Great Firewall of China. It was born of the Golden Shield project in 1996, only a few years after the internet was introduced to China. The intention for this firewall was to allow China to benefit from internet commerce while still maintaining the integrity of the state, disallowing any information that might harm the PRC constitution or promote social disorder. After 24 years, the wall stretched to surround everyone who uses the internet in China, which is a few hairs away from one billion people, or one-fifth of everyone using the internet today.

It has been challenging to understand how the firewall treats each individual request, mainly because of the arsenal of strategies the firewall uses, but researchers have uncovered a good amount of information on how it works.

Just like an actual wall, all communication in and out of mainland China is directed through traffic exchange points and then analyzed by the nodes of the great firewall. In this analysis phase, the firewall performs passive & active analysis.

Back when most web traffic was unencrypted, it was easy for the firewall to read the HTTP request header hosts and methods, for instance:

Host: www.youtube.com
GET /

Using a massive dictionary of keywords that listed banned sites, domains and keywords the firewall could tell when someone broke the rules. As HTTPS grew in popularity, this became harder. Yet, because a Server Name Indication (SNI) field is always sent first to declare a destination host for the TLS handshake, it could still be used to drop connections.

The advent of ESNI & ECH (Encrypted Client Hello) in an extension to the latest version of the TLS standard allows this first message to be encrypted so that the handshake process cannot be understood by anyone in between. The requesting computer must first retrieve the server's public key (either through DNS or by other means), and then can generate a one-time key to start the encryption process.

This has been damaging enough to the firewall that China straight up started rejecting ESNI traffic outright in late July of 2020 as an update to the Great Firewall.

Using the headers in unencrypted traffic, and the SNI fields in pre 1.3 traffic to identify threats, the firewall can actively break connections in a few ways. There's the TCP reset attack, where the firewall forges messages back to either party telling them to stop the connection. So although the firewall cannot stop the first packets from getting through, it can terminate the connection by injecting packets immediately after.

There's also BGP (Border Gateway Protocol) tampering, which allows large groups the size of internet service providers (Autonomous Systems) to misroute requests to a specific IP addresses. The firewall can direct outgoing traffic to blacklisted locations to β€˜nowhere’, null-routing or hijacking the requests. This requires a freshly updated list of blocked IP addresses and has the danger of blocking other sites that happen to share similar addresses.
One of the oldest and common attacks is DNS injection. DNS injection forges replies back to the requestors of blacklisted sites. This can even effect caches & routing outside of the country. As of October 2020, the GFW blocks close to a million domains and 3000 known keywords. You can actually check if a site is blocked in China using tools like GreatFire Analyzer.

In the third part of this article, we'll go step by step through how you can protect yourself from both Western & Eastern censorship methods.

Read more: @neo_network
Discuss at: @neo_network_chat
Protonmail Interview
βš›οΈβš›οΈβš›οΈ
@neo_network

Y'all may remember the ProtonMail article on @theconsciousresistance that made some waves. ProtonMail reached out to correct the record and we tried to setup a livestream to hear their side of the story.

They aren't willing to take live interviews, but they have written up a response for us. Derrick Broze & I will go over this response and discuss further on a video segment Friday 3/19 next week.

This is my first live interview (with many more planned) and I'll be live streaming on the @neo_network as well!

I have many more announcements in store for you. See you on the next-hop.

Read more: @neo_network
Discuss at: @neo_network_chat
Forwarded from The Free Thought Project
Most people still think taxation is the basis of civilized society. Nothing could be further from the truth. Taxation funds all the undesirable aspects of society which is why it has to be extracted with violence or threat of violence.

Good ideas don't require force.

#TaxationIsTheft
#TheFreeThoughtProject
Mass Extraction: The Widespread Power of U.S. Law Enforcement to Search Mobile Phones

Every day, law enforcement agencies across the country search thousands of cellphones, typically incident to arrest. To search phones, law enforcement agencies use mobile device forensic tools (MDFTs), a powerful technology that allows police to extract a full copy of data from a cellphone β€”
all emails, texts, photos, location, app data, and more β€” which can then be programmatically searched. As one expert puts it, with the amount of sensitive information stored on smartphones today, the tools provide a β€œwindow into the soul.”

This report documents the widespread adoption of MDFTs by law enforcement in the United States. Based on 110 public records requests to state and local law enforcement agencies across the country, our research documents more than 2,000 agencies that have purchased these tools, in all 50 states and the District of Columbia. We found that state and local law enforcement agencies have performed hundreds of thousands of cellphone extractions since 2015, often without a warrant. To our knowledge, this is the first time that such records have been widely disclosed.

Every American is at risk of having their phone forensically searched by law enforcement.

https://www.upturn.org/reports/2020/mass-extraction/

πŸ’‘ Read as well:
https://www.eff.org/deeplinks/2021/03/fbi-should-stop-attacking-encryption-and-tell-congress-about-all-encrypted-phones

#usa #fbi #lawenforcement #massextraction #MDFT #mobilephones #cellphones #encryption #decryption #study #thinkabout
πŸ“‘@cRyPtHoN_INFOSEC_FR
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@cRyPtHoN_INFOSEC_DE
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
We almost lost management of the .org top level domain to a venture capitalist firm (Ethos Capital) last year. Imagine what that could potentially mean to non-profit sites zoned within, raising yearly prices for the .org domain

We're not out of the woods yet, it just goes to show that the Internet Society is open to external influences through funding. They control the .org contract till 2029, and ICANN is unlikely to strip the rights from them.

What censorship resistant domains can we go to next?

https://www.eff.org/deeplinks/2020/04/victory-icann-rejects-org-sale-private-equity-firm-ethos-capital
Update on the ProtonMail interview with @theconsciousresistance - it will now take place Monday, 3/23 at 6 PM and it'll be live-streamed :)

More details & links to come.