Anti-Russia Internal Movements
Specifically, today the Putin regime is weak . And tomorrow he is also weak. And the day after tomorrow.
The solution lies not in the strength of the opponent, but in ourselves . We just need to combine our joint efforts and direct all our power to a specific point.
Exposition of revolutionary anarchism , Black Bridge , Svoboda Detachments , OVOD “Svoboda i Volya” , Fighter Anarchist/BOAK , Rospartizan , Anti-war sick leave , Black Journal , Media Partisans , Will of the Urals , Legion “Freedom of Russia” , XXII , Northern Eurasia , Voronezh Republic , Mom Anarchy! , Descendant of Cain and the rest,
It is in our power to do so. It is in our power to put an end to Putinism.
“Spring” , my dears, the posters are just a placebo, if you have a whole army in your hands, then direct it wisely. The truce you have made with the system will end sooner or later, whether you like it or not.
Media, you are everywhere, you are everywhere, guide the path of war.
I declare the second stage of deputinization begun. Learning from previous mistakes. We act ahead.
ZeroTrust – trust no one, not even yourself.
To get started, read about the ZeroTrust of a healthy person from the Greenhouse of Social Technologies: https://te-st.ru/2022/09/19/zero-trust/
If you are a partisan, forget what is written there, this is not for you, but for peaceful activists. You need a paranoid level of ZeroTrust to operate and stay free:
- Any interlocutor can turn out to be a member of the special services.
- A person you trust may spill the beans and give you away.
- A member of your resistance cell can be arrested by accident or on purpose, and pull the rest of the guerrillas through the chain of acquaintances.
- Your smartphone, laptop, computer, tablet may be stolen/lost/broken/confiscated by employees.
- Any group chat with any access can be infiltrated by employees. The larger the group and the more extreme the activity of the group, the higher the probability.
- Contact address can be forged (eg admin and admln).
- A link to a seemingly safe resource can be forged (twitter twiter twittr)
- 100% secure and trusted interlocutor can be hacked or otherwise compromised.
- Your Russian internet/mobile provider records your traffic and sends it to the authorities (it’s not even paranoia, it’s a fact, google “SORM” if you don’t know). Therefore, all your unencrypted conversations, including regular cellular communications (it is almost not encrypted by operators), are known to the “true major”.
- All Russian Internet services are either already transmitting data to the “trschu major”, or are about to do so.
- Centralized Whatsapp, Viber and other “unblocked” foreign messengers “cooperate” with the Russian security forces in various forms.
With Telegram, the situation is not entirely clear. On the one hand, the RKN fought with him and lost, and now Durov is putting a bolt on fines for “fake news about the Russian army and his own”. On the other hand, there is the fact that Smart Voting was blocked in the last Duma elections, probably because of the hostages – employees in Russia who were threatened with physical violence.
How to survive if you are paranoid in such a situation?
- Always assume that your interlocutor is a trsh major who sews a case on you and all your words can become evidence.
- Don’t tell anyone anything that might deanonymize you. No personal details to anyone, even if you trust us – including.
- Do not tell anyone the details of your plans, which will accurately indicate the place and time of the action.
- Use completely anonymous accounts that are in no way tied to your non-anonymous accounts and personal data.
- On local devices, keep a minimum of information related to the “partisan personality” or nothing at all, including anonymous messenger accounts. If you keep something, have a plan on how to quickly destroy the media/device.
- Store sensitive data and accounts in “clouds” and network folders in encrypted form. Links to these “clouds”, logins and passwords do not write down anywhere – remember.
Points 1-4 protect against linking the “partisan personality” to a real person. Paragraphs 5-6 allow “plausible deniability” in the event of a stop and search.
How to confirm the authorship of a direct action action , if you can’t tell anyone about your plans, and it’s dangerous to shoot a photo-fideo? Use a hash function to verify authorship:
