0 0
Read Time:51 Second

Everything privacy, security, and opsec related.

VICE review: “…one well known neo-Nazi channel that provides tradecraft to evade authorities online”

http://privsec3t3powecrcijlptxfl4v3fotoljlsiy2pz5flkcc4ip5dcvyd.onion

Every now and then the rare occasion arises where I am forced to have a talk with the audience. So here it goes…

 

http://privsec3t3powecrcijlptxfl4v3fotoljlsiy2pz5flkcc4ip5dcvyd.onion

I forgot to pay the rent last month and our server was taken down without warning. This wouldn’t be a big deal because I have a backup of the whole thing. The problem came about when the drive containing the backup was corrupted. I can no longer access the encrypted contents of the drive and so I have been forced to re-generate the keys for the hidden service.

This, however, is not all bad. We now have the opportunity to place the server in a new location, harden it further, and confuse the enemy.

For the foreseeable future our new hidden service url will be
http://privsec3t3powecrcijlptxfl4v3fotoljlsiy2pz5flkcc4ip5dcvyd.onion

https://treadstone71.com/index.php/summer-of-cyber

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence