Wikileaks claim that they are under attack and unable to broadcast, why would they not just release a pre-recorded video of Assange discussing this latest leak?
And I would hope- and am absolutely willing to do the same for others who download it- we would have each other's backs, right? No there is safety in numbers and I am ready to go and seeding it now
I COULDNT AGREE MORE. any naysayers are naive. Just look at twitter... people downloading left and right with no idea whatsoever what they are doing. (like me, therefore I will NOT download)This is the perfect cover for the evil ones. Haters STFU. this is correct logic.
From the Wikileaks website in regards to the FRENCH ELECTIONS.... "The revelations are contained within three CIA tasking orders published today by WikiLeaks as context for its forth coming CIA Vault 7 series" Are we being played?
The media has started reporting that the Russians are pulling the same election interference crap in France - so even if it's stuff about the French election, if it proves the CIA is trying to frame Russia for election interference in France, it could very well open the door to proving the Trump-Russia connection is absolutely false.
I was thinking the exact same thing the major news outlets if they choose to download the file or other professional researchers should have the resources and the insurance in the ways to do this then of a small-time people have and we would be wise to let them report on what they find versus try to download something completely unknown
I think there are too many of us now to make that worth doing, even if half of us go looking into this, therell be a huge amount of people focusing on the other work.
Those who control have used these bag of tricks many times before and it's worked.
I recently watched The Common Sense show with Dave Hodges, his take on it is similar to mine. There are bio-chemical warfare to herd the public. Genocide is a common bag of tricks. genocide or mass annehilation was foreshadowed on the Georgia GuideStones.
are there still throwaway phones that you dont have to register online? if so, do tell... cuz I dont know of a single one that you dont have to register first.
wish i was even close to a town. and tacos. so far from anything... question for you. i just learned how to look up who is accessing my computer via IP geo locator. LOTS of access form other states on a regular basis. shocking. what is the best VPN provider (safe) I just learned waht that was too... i need it. having strange things happen like video record coming on. or microphone record coming up. mouse moving independently... things like that. any recs?
Well think this.
Most folks who buy those phones are illegals from mexico. Many dont have a cc or a perm home address.
All you need is a email address. Can be any and thats it. You pay with cash only for the phone and you pay for the
Pay as you go with cash.
While this post comes off as concern trolling, I still recommend to use full disk encryption (FDE) on your drives, even if you dont keep personal information there, it makes it much harder for someone to plant or tamper data with physical access. Even so, "evil maid" attacks have been demonstrated to sniff FDE passwords and get around that if they can get physical access, but that is much more complex to pull off.
You should have a backup of critical data on a separate storage media (separate HDD/SSD) that is encrypted as well. You should encrypt personal data on cloud storage also.
And always use a VPN to avoid further traffic analysis from your ISP, I prefer PIA because their claim of not keeping logs was proven in court - https://www.privateinternetaccess.com/
meh pia is hosted in the us so even if they don't keep logs they could be forced to cooperate with active profiling etc. also with FDE you may be obligated to give them access or maybe face an obstruction charge or something, not sure how it works in usa. Another option is a truecrypt hidden volume, they wouldn't even know it existed without the password.
The other value of FDE is that nothing touches your hard drive in a form that is readable. So when you delete something it is properly deleted. The reason why planting on a non-FDE disk is an issue is that even if you delete something the second you see what it is it still touched your disk in a way that could match a hash of known illegal material.
maltespier ago
Wikileaks claim that they are under attack and unable to broadcast, why would they not just release a pre-recorded video of Assange discussing this latest leak?
Weightstone ago
7 is considered God's (hebrew: YHWH or Jehovah) number or Gods perfect number.
thisHoCwilltumble ago
yes, but there is thought it may have been compromised.
FuckReddit69 ago
good catch. 7 7 7. this might be code for: we're throwing you guys a bone.
crystalclearme ago
And I would hope- and am absolutely willing to do the same for others who download it- we would have each other's backs, right? No there is safety in numbers and I am ready to go and seeding it now
SickofRedditsShit ago
I'm not afraid. These pedo fuckers are pussies. I'm a real man. We will destroy them.
pizzagater99 ago
I wonder how many 0-day exploit are in that 7zip file
r3dtr1x ago
0
EndThePizza ago
Because he'll be the one in the videos? Lol
Oldno7 ago
CAUSE ALL MY O-FACES THE NSA HAS ON FILE ARE FROM NORMAL GROWN ASS MAN PORN! hahahaha
r3dtr1x ago
I ain't scared. Downloaded and ready to put in the password. Game on! I EVEN DID IT BARE IP WITH NO DISK ENCRYPTION!
ciitizenone ago
Same. Anyone wanna come knock on my door I'm just gonna pull my dick out and stare em down.
LostandFound ago
Badass how large is download?
r3dtr1x ago
515 megs or so
LostandFound ago
Ta
awarenessadventurer ago
I COULDNT AGREE MORE. any naysayers are naive. Just look at twitter... people downloading left and right with no idea whatsoever what they are doing. (like me, therefore I will NOT download)This is the perfect cover for the evil ones. Haters STFU. this is correct logic.
alanna ago
I worry it's a set up too. Time specific. Seems out of the ordinary for wikileaks
EricVikingurr ago
Sounds like a threat not a warning.
dougG ago
Oh man, you guys need to get out of the house more
4thDaGrymReaper ago
Learn how to use virtual machine software children. ---"Thanks Chef"
Psalm144-1 ago
From the Wikileaks website in regards to the FRENCH ELECTIONS.... "The revelations are contained within three CIA tasking orders published today by WikiLeaks as context for its forth coming CIA Vault 7 series" Are we being played?
https://wikileaks.org/cia-france-elections-2012/
r3dtr1x ago
The media has started reporting that the Russians are pulling the same election interference crap in France - so even if it's stuff about the French election, if it proves the CIA is trying to frame Russia for election interference in France, it could very well open the door to proving the Trump-Russia connection is absolutely false.
TRUTHWARRIOR ago
I was thinking the exact same thing the major news outlets if they choose to download the file or other professional researchers should have the resources and the insurance in the ways to do this then of a small-time people have and we would be wise to let them report on what they find versus try to download something completely unknown
madhatter67 ago
Right....Because the major news outlets are really going to. Investigate ....Like they have with other recent wikileaks ....
The more of us download it the safer it becomes for everyone
TRUTHWARRIOR ago
Please post your findings 😉
shoosh ago
cryptic shit, could they make a game more obvious? //sarcasm
nothing more than a cat and mouse play toy.
Basharalassad ago
please explain
sleepingbeautycan ago
Well, the series of tweets announcing what was coming was pretty cryptic. The pictures of the seed vault, nazi vault...etc.
It could be that they are trying to keep us busy on other stuff to distract us from our work.
shoosh ago
not to mention terms like 'year zero' and 'vault 7'.
They're turning this into a childhood game of clue. The problem is This is real life and I don't appreciate the cryptic terms like in game usage.
SpikyAube ago
I think there are too many of us now to make that worth doing, even if half of us go looking into this, therell be a huge amount of people focusing on the other work.
shoosh ago
Those who control have used these bag of tricks many times before and it's worked.
I recently watched The Common Sense show with Dave Hodges, his take on it is similar to mine. There are bio-chemical warfare to herd the public. Genocide is a common bag of tricks. genocide or mass annehilation was foreshadowed on the Georgia GuideStones.
Touchdown50 ago
Ohhhhj shit. Thats right. Double edge sword theory. Just get a burner phone. Throw the phone away after
awarenessadventurer ago
are there still throwaway phones that you dont have to register online? if so, do tell... cuz I dont know of a single one that you dont have to register first.
Touchdown50 ago
Boost mobile
Touchdown50 ago
Yes go to a pay as you go store in a Latino populated part of town and you can buy a burner phone for 50.00 to 100 bucks.
awarenessadventurer ago
wish i was even close to a town. and tacos. so far from anything... question for you. i just learned how to look up who is accessing my computer via IP geo locator. LOTS of access form other states on a regular basis. shocking. what is the best VPN provider (safe) I just learned waht that was too... i need it. having strange things happen like video record coming on. or microphone record coming up. mouse moving independently... things like that. any recs?
Touchdown50 ago
No paper trail
Touchdown50 ago
Well think this. Most folks who buy those phones are illegals from mexico. Many dont have a cc or a perm home address. All you need is a email address. Can be any and thats it. You pay with cash only for the phone and you pay for the Pay as you go with cash.
Weightstone ago
just so you know... aye is pronounced the same as eye. its how we Scotts say 'to the affirmative' 'yes' 'agreed' etc...
Proii_Pariah ago
This was my very first thought upon reading of the Vault 7 download. Definitely a worthwhile reminder toward caution.
throwaway89209834 ago
While this post comes off as concern trolling, I still recommend to use full disk encryption (FDE) on your drives, even if you dont keep personal information there, it makes it much harder for someone to plant or tamper data with physical access. Even so, "evil maid" attacks have been demonstrated to sniff FDE passwords and get around that if they can get physical access, but that is much more complex to pull off.
For windows I recommend - https://veracrypt.codeplex.com/
If you are on linux, i'd go with LUKS and these steps generally work - http://www.pavelkogan.com/2014/05/23/luks-full-disk-encryption/
You should have a backup of critical data on a separate storage media (separate HDD/SSD) that is encrypted as well. You should encrypt personal data on cloud storage also.
And always use a VPN to avoid further traffic analysis from your ISP, I prefer PIA because their claim of not keeping logs was proven in court - https://www.privateinternetaccess.com/
mysecretidentity ago
meh pia is hosted in the us so even if they don't keep logs they could be forced to cooperate with active profiling etc. also with FDE you may be obligated to give them access or maybe face an obstruction charge or something, not sure how it works in usa. Another option is a truecrypt hidden volume, they wouldn't even know it existed without the password.
bikergang_accountant ago
The other value of FDE is that nothing touches your hard drive in a form that is readable. So when you delete something it is properly deleted. The reason why planting on a non-FDE disk is an issue is that even if you delete something the second you see what it is it still touched your disk in a way that could match a hash of known illegal material.