a lot of “analysis if extremists” sites have pretty fallacious analysis, but this one generally has content that conveys a good read of things
https://gnet-research.org
https://gnet-research.org
“Who are our enemies? Who are our friends? This is a question of the first importance for the revolution. The basic reason why all previous revolutionary struggles in China achieved so little was their failure to unite with real friends in order to attack real enemies.” ~ Mao
“You must understand that there is more than one path to the top of the mountain.”
Miyamoto Musashi
Miyamoto Musashi
“Spectacle’s maneuver is well known, which consists in taking symbolic control of movements by celebrating them in a first phase for what they are not, the better to bury them when the right moment comes.”
The Invisible Committee
The Invisible Committee
“Spread out, have y’all shit ready, hit these motherfuckers from the top of these buildings, from everywhere yo, like, it’s more of us than them. That’s the motherfucking plan. Get your shit, spread the fuck out, let’s starting flooding they motherfucking asses. I’m getting my shit together. I’m about to just strike as much as I can, while I can, and just get up out of there, in and out, in and out, in and out. Keep sabotaging shit. And move the fuck around.”
Winston Smith on swarm tactics and maneuvering
Winston Smith on swarm tactics and maneuvering
Media is too big
VIEW IN TELEGRAM
Some interesting street fighting tactics on display in Palestine.
Forwarded from cRyPtHoN™ INFOSEC (EN)
FBI training document shows lawful access to multiple encrypted messaging apps.
Which are the most secure encrypted messaging apps? An FBI document shows what data can be obtained from them.
The Record shared an FBI training document that reveals the surveillance capabilities of the US law enforcement detailing which data can be extracted from encrypted messaging apps.
The document analyzes lawful access to multiple encrypted messaging apps, including iMessage, Line, Signal, Telegram, Threema, Viber, WhatsApp, WeChat, or Wickr.
The above document, dated to January 7, 2021, was obtained through a FOIA request filed by the US nonprofit organization Property of the People.
https://securityaffairs.co/wordpress/125176/security/encrypted-messaging-apps-data-access.html
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Which are the most secure encrypted messaging apps? An FBI document shows what data can be obtained from them.
The Record shared an FBI training document that reveals the surveillance capabilities of the US law enforcement detailing which data can be extracted from encrypted messaging apps.
The document analyzes lawful access to multiple encrypted messaging apps, including iMessage, Line, Signal, Telegram, Threema, Viber, WhatsApp, WeChat, or Wickr.
The above document, dated to January 7, 2021, was obtained through a FOIA request filed by the US nonprofit organization Property of the People.
https://securityaffairs.co/wordpress/125176/security/encrypted-messaging-apps-data-access.html
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
“In a war there are many moments for compassion and tender action. There are many moments for ruthless action - what is often called ruthless - what may in many circumstances be only clarity, seeing clearly what there is to be done and doing it, directly, quickly, awake, looking at it.”—Willard, Apocalypse Now