Space Antenna

Space Antenna
Keep Your Eyes On The Skies

Saturday, December 6, 2014

The Cold List, updated September 2015.

                                                   Jae Kamel’s URLs Presents….

                                                            The Cold List
                                                   September 2015 Edition

Christmas-Free For Your Protection

I. Freedom.
II. Sex.
III. Music and Video.


Note: When Word will not perform the link, copy and paste to address bar, same as usual. All links good at time of list composition. See also Online Tools 2015 for more Freedom and Privacy links.

I. Freedom. }special Art projects. Don’t drive there in your car, though.
http://32rfckwuorlf4dlv.onion/ }Small list of Onionland links. Also hosts a forum. 2015 DL. Replacement: http://udsmewv45lunzoo4.onion/ }TorLinks is a moderated replacement for The Hidden Wiki, and serves as a link or url list of Tor hidden services. Feel free to copy this deep web link list directory to your website to make others aware of the darknet. We regularly update the tor onion sites on this site.
http://54ogum7gwxhtgiya.onion/ }BTC Address: 1L4AYUxUW653tqwFpeVMz7FCr7EXntDgXU . Link goes to: http://54ogum7gwxhtgiya.onion/blog/index.php/language/en/ }Technodrome, Sweet Home Technodrome – Krang Base hide in Tor.
http://54ogum7gwxhtgiya.onion/blog/index.php/secure-communication-in-the-tor-network/#more-327 }”After the fall of Tormail many users began to wonder about the security of network communication path. Those who have used PGP can sleep peacefully, others are wondering what they will be. (show no mercy or PGP for resistant Windows User). In total, this entry is for both groups. For a reasonable new, alternative ways of communication for victims lesson for the future and the desire to suggest a good solution. Enough of introduction.Here is a significant list of solutions for secure communication in an onion: “ }the aanr advocacy site. }their Law Library page. }the nudist bill of rights. }In this post, I’ll show you how to delete personal information from one of the
largest people search databases on the web: I’m Maggie; I help run our DeleteMe service, which takes the hard work out of removing personal data from the web, and I’ve become an expert on how to ensure your private info stays private.Follow these step-by-step instructions to remove your personal info from BeenVerified: }Peter Guttman’s excellent “Godzilla crypto tutorial” is on this page, and uses 973 slides in 12 parts. Recommended. }their freedom and justice links and articles. }their criminal justice, so-called, articles and news. DL 2011 Replacement: }show all of their key-issues, link to category from their. }their links to other c.j. sites. }It seems that literally no one is safe from the NSA. Even digital alter egos living in fantasy realms in the online gaming world are being caught up in the NSA's surveillance dragnet. A newly leaked internal document reveals that the NSA and British intelligence agency GCHQ have developed mass collection capabilities enabling them to monitor the activities and communications of the 48 million Xbox Live console network gamers. U.S. intelligence agents from the FBI and CIA, along with GCHQ agents, have also been infiltrating virtual worlds created in games like Second Life and World of Warcraft. On Monday, eight of the U.S.'s largest tech companies fought back by launching a campaign to rein in government surveillance. They published a website, took out full-page ads in national newspapers, and wrote an open letter to President Obama and to Congress demanding that the government end bulk collection and target its surveillance at individuals suspected of wrongdoing. Actipedia is an open-access, user-generated database of creative activism. It’s a place to read about, comment upon, and share experiences and examples of how activists and artists are using creative tactics and strategies to challenge power and offer visions of a better society. }”If not you, who? If not now, when?” (Apologies to Martin Buber.) The activism website, clean, easy to read, easy to use. No ads, no redirect, Recommended. }RFID tags are small embedded chips in documents and objects that respond to remote requests with identifying data. Originally conceived as a way to identify and track objects, RFID tags are increasingly being used to tag and "authenticate" human beings. That's a different world entirely: if RFID tags are included in California IDs without safeguards for your privacy, your personal information could be scanned without your knowledge or permission, exposing you to the risk of tracking, stalking, and identity theft. }65 links on this page. Activism: Cyber Rights and Online Civil Liberties: "Information is the currency of democracy." -- Thomas Jefferson }this page has a good selection of annotated links on cryptography. }a fairly long, organized set of links about sex and sexuality. }The year 2014 has made it very clear that privacy is under threat, and the situation is not likely to improve. Mass surveillance – which became a national issue via the Edward Snowden leaks – is not subsiding or under reform; instead, it is becoming more bold and complex with each passing day. }With eye-opening footage, revealing interviews, humorous anecdotes, and an array of visual effects, the film categorically explores the alleged usage of subliminals in advertising, music, film, television, anti-theft devices, political propaganda, military psychological operations, and advanced weapons development. }remember Act Up? This is their Civil disobedience index. You can download various manuals and guides from here. Also here }is their page on Consensus decision making. }on this you can find tactical updates for the Occupy Movement. In fact, you can find lots about the Occupy Movement here. Joe-Bob says, check it out. }their IRC. Yes, seriously. Yes, it is 2014 now, almost 2015, and IRC is – evidently – still used. The channel is #aircrack-ng and is located on Freenode. We try and remain as informal as possible, but there are some rules we'd appreciate it if you'd follow! Broadly, if you're friendly, tolerant, and reasonable, you'll probably get a pretty long way without any specific knowledge of the rules - but for the avoidance of doubt, here they are! Famous quotes from #aircrack-ng can be found here :) }ALA’s extensive First Amendment, liberty and privacy principles guide the association’s work in the federal legislative and policy arenas as well as at the state and local levels in order to protect personal privacy based upon a long standing commitment to patron privacy. Advancing the library community’s principles to protect patron confidentiality requires major grassroots work from the library community to promote library priorities in these environments. There are several parts of ALA that work on these important issues. }Protesters rally outside the U.S. Capitol against the NSA's recently detailed surveillance programs June 13, 2013 in Washington, DC. Thousands of activists took to the streets and the Internet Thursday to mark July 4 with protests against the NSA. The protests, organized by the "Restore the Fourth" movement, were intended to raise "awareness of and spur political action against unconstitutional spying by the US government," organizers said. }"Freedom paintings", with quotations about freedom on each page under painting. Click "next page". }another FYI. More Hot stuff. Your town or mine should be so lucky as to have people like this living there. }iSee project. You really should check some of this stuff out. }some documentation, etc. }their link list (“Associates”). }Wiretap is run as a free public service to provide electronic text to citizens of the Internet. As one of the earliest e-text repositories, there are thousands of links to this site. All of this material was gathered and organized in an Internet world prior to creation of the World Wide Web. As such, it still resides in the archaic Gopher form. We will be updating and extending the e-text collection for display under WWW, though still maintaining its text-only character for the underlying corpus itself. Note: this older website may be gone soon, use it or lose it. Established 1990 Located this week in Mt View, California Last change: 10 Dec 97 Wiretap has been in dozens of books (Planet Internet, Cultural Treasures of the Internet, Yellow Pages, etc), and innumerable newspapers, including the New York Times. It is probably the single useful gopher resource remaining on the Internet. We plan to be considerably expanding our offerings in the near future. More books, more authors. }site about the free art of free people in public. }The Center for Artistic Activism is a place to explore, analyze, and strengthen connections between social activism and artistic practice. Our goal is to make more creative activists and more effective artists. We aim to win. }a way to download cryptome’s security archives. Cryptome has removed their own archives, and these documents may be fakes (e-mail cryptome to find out). They have document downloads on their site. }Manifetso2020 association, taking us from the ex-OPP, the old asylum which is now one of the possible objectives of a new era of city projects, with its beautiful spaces up the hills and unused buildings full of history, down to the old port, where an incredible number of practically abandoned buildings, clear example of industrial archaeology, are ready to host events, projects, fairs, concerts, exhibits and shows. All the while we have been able to experience the peculiarities of the city, such as the characteristic ways in which the go to the beach, along the coastal roads of the Barcola with the typical Topolini buildings.
http://bdpuqvsqmphctrcs.onion/ }“Epigraph: Due to Orwell-like total control of reality, global government somewhere called "Babylon", tries to drop in storm of shit everything what they cannot control. Looks like all types of mentally ill people gathered together by this kind of elite, fags, pedos, with tries to litter at maximum hidden, uncontrollable part of network. From one point of sight this is plus for tor project, because its like a proof of secure. But you must remember about tempest of attacks possible to hidden services and tor network at all. Tor can't help you if you use it wrong. Tor is only the second generation of hidden networks, there are still many weak places and tor is still centralized. Just imagine how easy CIA can takeover only 9 servers(main directories) and carry out their discreet and efficient attacks. There are only five thousands relays and at least a quarter of its staying as a exit. 1000 servers around the world ? Hm...” This is the first and only collection of Tor-.onion links which are still valid. May, 2015. Check this our before all the links are broken or the site taken down. That happens very often on Tor-.onion sites. }CFP is a very valuable conference for the comprehensive lens on digital privacy to be explored and to be responded to by government, private business, privacy advocates and the public. Who knew Microsoft would make an effort after receiving the '04 Big Brother award to come around to digital privacy. }found on the Tor network, using the DDG .onion search engine. CryptoWall and HELP_DECRYPT Ransomware Information Guide and FAQ. By Lawrence Abrams on July 10, 2014 @ 02:11 PM | Read 431,861 times. CryptoWall is a file-encrypting ransomware program that was released around the end of April 2014 that targets all versions of Windows including Windows XP, Windows Vista, Windows 7, and Windows 8. The media is commonly confusing CryptoWall with the CryptoLocker infection, when it is much more similar to the CryptoDefense ransomware. The most apparent similarity being that CryptoWall's Decryption Service is almost identical to the one for CryptoDefense. In October 2014, the malware developers released a new version of CryptoWall called CryptoWall 2.0. This new version included some additional changes that are described in the next section. When you are first infected with CryptoWall it will scan your computer for data files and "encrypt" them using RSA encryption so they are no longer able to be opened. Once the infection has encrypted the files on your computer drives it will open a Notepad window that contains instructions on how to access the CryptoWall Decryption Service where you can pay a ransom to purchase a decryption program. The ransom cost starts at $500 USD and after 7days goes up to $1,000. This ransom must be paid in Bitcoins and sent to a Bitcoin address that changes per infected user. }Prominent national security whistleblowers are calling for the full repeal of the USA Patriot Act, charging that under that legislation the federal government has decimated the U.S. Constitution and warning that unless action is taken, there is no end in sight to government secrecy and manipulation. }"In the counsels of Government, we must guard against the acquisition of influence, whether sought or unsought, by the Military Industrial Complex. The potential for the disastrous rise of misplaced power exists, and will persist. We must never let the weight of this combination endanger our liberties or democratic processes. We should take nothing for granted. Only an alert and knowledgeable citizenry can compel the proper meshing of the huge industrial and military machinery of defense with our peaceful methods and goals so that security and liberty may prosper together." }this site presents “freedom psychology”. Its writer has some of the basic points quite right; Joe-Bob says, check it out. }watch the masterpiece video on full-screen, and get a look at freedom. The video is in the video list below. }Your antivirus could not detect such programs because they use compression and encryption of its files. The sample software is Hacker Defender rootkit. UnHackMe allows you to detect and remove Rootkits. UnHackMe tested for removal all modern rootkits: Rustock, Haxdoor, Hacktool, Elite Keylogger etc. }Footprinting and Scanning is the first basis of hacking. Information gathering has many phases like profiling your target. Whois, ARIN can reveal public information of a domain that can be leveraged further. Traceroute and mail tracking can be used to target specific IP and later for spoofing. Nslookup can reveal specific users and zone transfers can compromise DNS security. Footprinting is necessary to systematically and methodically ensure that all pieces of information related to the aforementioned technologies are identified. }use the Internet anonymously almost anywhere you go and on any computer: all connections to the Internet are forced to go through the Tor network (see below); leave no trace on the computer you're using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, email and instant messaging. }from here you can download Tor for free. Yes, you want to. }Bureau of Inverse Technology (geek-friendly). “public audio database of civil liberty infringements and other antiterror events…bi-atlantic audio database reports sparrow population crash…engineered for semi-autonomous deployment…bureau inserts geospecific data directly into taxi display units…slow pollutant detector cam”, samples from their index page. }”The Digital National Security Archive contains the most comprehensive set of declassified government documents available. The resource now includes 38 collections consisting of over 94,000 meticulously indexed documents, with more than 650,000 total pages. Each of these collections, compiled by top scholars and experts, exhaustively covers the most critical world events, countries, and U.S. policy decisions from post World War II through the 21st century. Together, these collections offer unparalleled access to the defining international strategies of our time.” }"A national poll shows a third of Americans worry their privacy will suffer if drones like those used to track U.S. enemies overseas become the latest police tool for tracking suspected criminals at home." -- Associated Press The Rutherford Institute drafted model legislation entitled "Freedom from Drone Surveillance Act." has partnered with Rutherford on this great effort. 2015 DL. Now use this: }The Freedom from Drone Surveillance Act Is Crucial to Americans' Privacy Rights. While the threat these drones pose to privacy is unprecedented, they are being unleashed on the American populace before any real protocols to protect our privacy rights have been put in place and in such a way as to completely alter the landscape of our lives and our freedoms. We are truly entering a new era. Drones are equipped with thermal imaging devices to see through walls6 and outfitted with infrared cameras and radar7 which allow the police to keep track of anyone walking around, regardless of the nature of their business. }Fact is, most of the new identity systems people come up with don't work, but now and then we discover a clever new approach that actually does work. If the new system works well and passes all our tests - we add it to our updated report.As a result, our report is constantly being updated with the newest, very latest tactics available! NEW for 2015 - Includes Full Details of the New "Pass ID" Drivers License System. Our new 2015 updated report now contains seven completely different identity changing systems! No other eBook comes close! This treasure trove of difficult-to-find information is what makes our report so powerful, so different, so unique. }the website Counter-Balance, Challenging the European Investment Bank. }Committee to Protect Journalism (international). Defending journalists worldwide. }American articles, reports, newsletters, alerts. }The Critical Art Ensemble. }The Center for Nonviolent Communication. “The natural state of compassion when no violence is present in the heart.” }video of Rosenberg speaking about his peacemaking work in Africa, 9:54. }This is the best glossary of cryptography that we’ve ever seen online, and maybe offline too! Highly Recommended, and that’s our highest rating. Everything you could want to know. }Ritter’s turorial. Learn cryptography, and be Free. }Note that some opt-out forms paradoxically require you to submit personal data in order to have it removed; be your own judge of whether this is wise. (I recommend creating a temporary email address specifically for these requests.) Also note that with most of these services you'll receive a confirmation email shortly after you submit your removal request. If you don't see the email in your inbox, check your spam filter. Here's what I found when I tried to opt out of each one: }Snoopy, a tracking and profiling framework, can be installed on a RaspberryPi or other low-cost hardware to collect information on people who walk past by connecting to their device's active Wi-Fi or Bluetooth signals. The data collected can be used to profile users based on the access points to which their devices have connected. The tool was demonstrated at the Black Hat Arsenal by Glenn Wilkinson, a security analyst at U.K.-based security consultancy SensePost. It can be used by ethical hackers to collect anonymous statistics or, more maliciously, to inspect the intercept traffic and conduct surveillance on a targeted victim. Snoopy can be set up as a rogue access point, making it appear to look like a hotel or café Internet access point. }Cryptome welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance -- open, secret and classified documents -- but not limited to those. Check out this site. Full of links and document downloads. }’git’ tutorial primer. “My name is Daniel Miessler and I work in Information Security based out of San Francisco, California. This site is a life project based on creating, consuming, and sharing worthwhile content in the areas of information security, philosophy, politics, design, and other topics.” Site Recommended, we found it readable, clear, clean, and useful. “hacker”, “techie” and “geek” news and info. }more about Snoopy. In this paper the unique signatures that mobile devices emit was introduced. From this initial observation a hypothesis was constructed with the intention of tracking people based on devices
they carry, as well discovering personal information about them. Numerous wireless technologies were discussed, identifying their range and possible fingerprint. The Snoopy framework was then introduced as a distributed, tracking, profiling, data interception, and analysis tool. The framework is technology agnostic and can
be used to track any signature for which a suitable Python plugin can be written. Result data was discussed from field experiments with the framework, and additional hypothetical scenarios were discussed. Finally, advise was given on how to be aware of one’s own footprint, as well as a mention for future work }”Legal and ethical questions arising from the growth of modern duplication technology are myriad and manifold. Taping, photocopying, and now digital sampling have forced legal battles to define the limits of what U.S. copyright law terms "fair use." One of the most interesting of these battles has been that focused on the work of the Bay-area band known as }part of the Tactical Arts Coalition. }their links. Another really good link list you should sample from. }Words From The Homefree.
http://dppmfxaacucguzpc.onion }TORDIR - Link List. 2015 DL. Replacement: http://udsmewv45lunzoo4.onion/ }TorLinks is a moderated replacement for The Hidden Wiki, and serves as a link or url list of Tor hidden services. Feel free to copy this deep web link list directory to your website to make others aware of the darknet. We regularly update the tor onion sites on this site. }The Surveillance Self-Defense Project. Surveillance Self-Defense (SSD) exists to answer two main questions: What can the government legally do to spy on your computer data and communications? And what can you legally do to protect yourself against such spying? }Electronic Frontier Foundation, San Francisco. }The right to privacy is often understood as an essential requirement for the realization of the right to freedom of expression. Undue interference with individuals’ privacy can both directly and indirectly limit the free development and exchange of ideas. … An infringement upon one right can be both the cause and consequence of an infringement upon the other. }activists with the Freedom not Fear movement will stage an international week of action to oppose various forms of surveillance. EFF is spending this week examining surveillance trends and spotlighting movements that have sprung up in opposition. You can follow our series here. }This page is a portal for information on three closely related projects EFF has been deeply engaged in on this front. State surveillance is a growing problem. From North America to South America, Europe to the Pacific Rim, proposals for mandatory data retention, (un)lawful interception, legislative proposals to broaden law enforcement access to peoples’ communications and data threaten to jeopardize freedom of expression, privacy and association. }about public color printers tracking your documents. }The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features.
http://ekwreugkil5ncyyh.onion/ }A small list of onion links. 2015 DL. Replacement: http://udsmewv45lunzoo4.onion/ }TorLinks is a moderated replacement for The Hidden Wiki, and serves as a link or url list of Tor hidden services. Feel free to copy this deep web link list directory to your website to make others aware of the darknet. We regularly update the tor onion sites on this site. }the electronic privacy information center, or EPIC. They provide information and advocacy for your privacy and freedom.
http://eqt5g4fuenphqinx.onion/ }Simple onion bootstrapping. 2015 DL. }another place to download Tor for free. }links to freedom-related websites. }open source, etc., technology. Check it out. News that you need to know about. They have many forums and meet-ups on freedom related subjects, etc. }one of our favorites is their Design For Social Change page. Here you can find such as, a drive-in theatre made of used and salvaged materials.!&id=1256319 }the IPFF ( International Planned Parenthood Federation) declaration of sexual rights. These are Human Rights that are Sexual in Nature. }projects and activities of the Experimental Interaction Unit. DL 2011 Replacement: }check it out. }another collection of Freedom links, mostly freedom of expression, on/offline, and civil liberties. Not an art site, more law and public policy-oriented. }a really, really good article about Censorship. }Won’t you join FFRF in our critical work to promote nontheism and defend the constitutional separation between religion and government? With more than 21,500 members, the nonprofit FFRF works as an effective state/church watchdog and voice for freethought (atheism, agnosticism, skepticism). }Unfortunately, an identity based on a forged birth certificate is of limited value. If you need a new social security number (required by federal law to get a normal job) forged documents won't get the job done. To get a new social security number issued, you'll need a genuine, officially-issued birth certificate which can be verified by the issuing authorities. To improve your odds even further you'll need "new" parents who have verifiable birth
certificates. However, an identity based on a forged birth certificate and a forged baptismal certificate can be very useful as a quick, transitional identity to be used while you're waiting to receive your genuine ID documents. Using forged documents you can get a genuine drivers license the same day, so this approach can be extremely useful when you're in a hurry. Our report discusses the easiest and most reliable way to accomplish this feat. }And be careful who you buy your fake new identity documents from. Some of those people who offer to sell you fake ID on the street are working with detectives and will either have you arrested when you pick up your new identity documents or will routinely forward the personal information you give them to the FBI. Also, some of the most authentic new identity documents you'll be offered may actually be genuine documents that are unfortunately stolen and therefore useless. If you seriously want to wipe the slate clean and get a second chance at life, you're going to need a full set of genuine new identity documents including a new drivers license, a new social security card and new bank credit cards. You'll never be secure living a new life under forged identity documents. A new identity is like a new house, if it's to last it must be built on a solid foundation. }Other inexperienced identity-changers attempt to "borrow" the identity of a dead infant. This tired old technique has been so terribly over used by criminals that it’s now practically worthless. Several government agencies have actually gone to the trouble of compiling dead infant databases that contain information on all the infants buried in cemeteries around the country. Also, soon the cross-referencing of the official birth and death records will be completed which, in effect, will be the end of this sad old approach. Clearly what’s needed is an entirely new approach.The information in this unique report comes directly from several underground groups who are the only real experts on the subject. This new report marks the first time these groups have released this controversial information to the general public. For more information, please feel free to explore the links below. }Unfortunately a new identity borrowed from a dead infant can easily be exposed as fraudulent as it will forever be linked to others by both the name and the birthdate. Today many vital records offices are busy cross-referencing their birth and death records. As a result, in the near future anyone who attempts to verify one of your new identity documents will be promptly informed that you're dead! Since this approach is a favorite of hardened criminals and is widely discussed in prisons, there's an excellent chance you'll end up sharing your new identity with a major criminal. Perhaps you'd like to share your new identity with someone on the FBI's top ten most wanted list? Or maybe you would you like to share your new identity with an international terrorist? While this system worked well back then, today it's clearly an invitation to disaster and should be carefully avoided. }articles and blog site for Fairness and Accuracy In Reporting. }nonprofit Freedom From Religion Foundation works to educate the public on matters relating to no theism, and to promote the constitutional principle of separation between church and state. The Foundation is the nation's largest association of freethinkers (atheists, agnostics and skeptics) with over 17,000 members. Here: }they have a free information packet. }more example of Censorship in America (regarding items for which Freedom should have prevailed.) }AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The hack was perpetrated by a joint unit consisting of operatives from the NSA breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data. }RESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept. The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics.The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released. }from here, download apps “tools” to hack The System. }Activism: Privacy and Security Issues: Spying on activists is a common tactic and is something activists should be (at least) slightly concerned with. On one hand, this attention means the group is making some things happen. On the other, the privacy and security of activists can be compromised. }They’re angry at and afraid of Big Brother in France, too, you should know. Since the original link leads to a site in French, here’s a translated link: }note that “liens” is the French work for “links” if you want to look at their link list. }this is the new freedom house website, recently rebuilt. 11feb12. Freedom House supports democratic change, monitors freedom, and advocates for democracy and human rights around the world. Freedom House's programs primarily offer assistance by providing information, as well as trainings, and on-site technical advice. Freedom House sometimes also provides financial support. }their Self-Help Legal Clinic. Good quotes! DL 2011 Replacement: }hope this of use to you. }nice links to Federal and State laws and statutes. DL 2011 Replacement: }if you need to know. }site for the Free Expression Network, a project of the national coalition against censorship. }Decentralized, censorship-resistant distributed data store which aims to provide freedom of speech through a peer-to-peer network with strong protection of anonymity. Freenet works by pooling the contributed bandwidth and storage space of member computers to allow users to anonymously publish or retrieve various kinds of information. }The FISA court has used judicial overreach to approve the NSA’s warrantless wiretapping. “In more than a dozen classified rulings, the nation’s surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans while pursuing not only terrorism suspects, but also people possibly involved in nuclear proliferation, espionage and cyberattacks, officials say. }Such spying has a chilling effect on the free expression, dissenting voices and political organizing the First Amendment is supposed to safeguard. Fortunately, we still have people willing to speak out in the face of intense government harassment, brave whistleblowers willing to risk so much to expose this wrongdoing, and journalists willing to investigate and tell these stories. }this is one of the strangest pages we have seen. It is a little difficult to read, but easier if you “zap” the colors. We thought, if you’re here and you enjoy the other links in this category, then you’ll enjoy this page too… “Jedi Mind Tricks”, “verbal slaughterers of the Judeo-Christian ethic”. }this site shows the track format of magnetic stripe cards. }Uroburos is a rootkit, composed of two files, a driver and an encrypted virtual file system. The rootkit is able to take control of an infected machine, execute arbitrary commands and hide system activities. It can steal information (most notably: files) and it is also able to capture network traffic. Its modular structure allows extending it with new features easily, which makes it not only highly sophisticated but also highly flexible and dangerous. Uroburos' driver part is extremely complex and is designed to be very discrete and very difficult to identify. }shows where wildfires are occurring in the U.S. You can change scale, grab and slide map, etc. Good info. }Ghostery is your window into the invisible web – tags, web bugs, pixels and beacons that are included on web pages in order to get an idea of your online behavior. Ghostery tracks the trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity. }download link for the snoopy-ng modular digital terrestrial tracking framework. }this seems like a good incident locator map but does require registration and login. We’ll do tests after our registration is approved by their administrator. }The Centre for Research on Globalization (CRG) is an independent research and media organization based in Montreal. The CRG is a registered non-profit organization in the province of Quebec, Canada. In addition to the Global Research websites, the Centre is involved in book publishing, support to humanitarian projects as well as educational outreach activities including the organization of public conferences and lectures. The Centre also acts as a think tank on crucial economic and geopolitical issues.Since September 2001, we have established an extensive archive of news articles, in-depth reports and analysis on issues which are barely covered by the mainstream media. In an era of media disinformation, our focus has essentially been to center on the “unspoken truth”. }"Sometimes administrator (possible you too) forgets (sic) to change default password like 'admin:admin' or 'admin:12345' on security surveillance system, online camera or DVR. Such online cameras are available for all internet users. Here you can see thousands of such cameras located in a cafes, shops, malls, industrial objects and bedrooms of all countries of the world. To browse cameras just select the country or camera type," its administrator said. Here's one more reason for owners of security cameras to change their devices' default passwords: their private lives could be made public by a hacker's website. The site claims to link to more than 73,000 security cameras whose default passwords the owners failed - or did not bother - to change. In the Philippines, it listed at least 507 such sites as of Tuesday noon."Mostly, it falls on us, dear security-conscious readers, to nudge our not-so-techy friends and remind our families how very important it is to set strong passwords on security cameras unless they want to give the whole world a free pass to watch inside their homes," it said. On the other hand, Motherboard magazine said the website is "one of the latest, and perhaps biggest, examples of a trend wherein security researchers risk people’s personal privacy under the justification of exposing security issues." "Although this approach can sometimes force a vendor to act and fix the problem ,it can also harm the public at large," it said. }The GNU Privacy Handbook, Copyright © 1999 by The Free Software Foundation. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". Please direct questions, bug reports, or suggestions concerning this manual to the maintainer, Mike Ashley (<>). When referring to the manual please specify which version of the manual you have by using this version string:$Name: v1_1 $. }how to use google for hacking, for example, hacking security cameras. }Almost half of the Internet users across the globe use ADSL routers/modems to connect to the Internet. However, most of them are unaware of the fact that it has a serious vulnerability in it which can easily be exploited by anyone with a basic knowledge of computer. In this post, I will show you how to hack an Ethernet ADSL router by exploiting the common vulnerability that lies in it. }write-protect USB drive. Also on on this page, a write-protect tool. }the blog page for this site. “Dedicated to outfitting graffiti artists with open source technologies for urban communication.” }the national security archives. That’s right, some Americans are keeping an eye on the NSA and HAS and FBI, an reporting to you on this website, and the sites & pages linked to. Recommended. From the site: “Founded in 1985 by journalists and scholars to check rising government secrecy, the National Security Archive combines a unique range of functions: investigative journalism center, research institute on international affairs, library and archive of declassified U.S. documents ("the world's largest nongovernmental collection" according to the Los Angeles Times), leading non-profit user of the U.S. Freedom of Information Act, public interest law firm defending and expanding public access to government information, global advocate of open government, and indexer and publisher of former secrets.” }who is Noam Chomsky? –You can’t be serious. "The time has come for a call to action to people of conscience. We are past the point where silence is passive consent — when a crime reaches these proportions, silence is complicity." — Noam Chomsky. }We employ volunteer hackers and technologists through our Volunteer Network and engage their skills in short projects designed to help charities that can not afford traditional technical resources. Our industry experts vet all the work to guarantee a high-quality product, and volunteers are rewarded with glowing references from our industry-recognized subject matter experts. With each project, our volunteers move one step closer to that dream job, and a charity is brought one step closer to its technical goals. We’ve designed, built and hosted web sites, set up blogs, programmed custom web applications, conducted code reviews, performed security assessments and more, all through our volunteer’s efforts. We’ve personally witnessed how one person can have a profound impact on the world. By giving of their skills, time and talent our volunteers are profoundly impacting the world, one “hacker” at a time. }while the term botnet can be used to refer to any group of bots, such as IRC bots, the word is generally used to refer to a collection of compromised machines running programs, usually referred to as worms, Trojan horses, or backdoors, under a common command and control infrastructure. A botnet's originator (aka bot herder) can control the group remotely, usually through a means such as IRC, and usually for nefarious purposes. Individual programs manifest as IRC bots. Often the command and control takes place via an IRC server or a specific channel on a public IRC network. A bot typically runs hidden, and complies with the RFC 1459 (IRC) standard. Generally, the perpetrator of the botnet has compromised a series of systems using various tools (exploits, buffer overflows, as well as others; see also RPC). Newer bots can automatically scan their environment and propagate themselves using vulnerabilities and weak passwords. Generally, the more vulnerabilities a bot can scan and propagate through, the more valuable it becomes to a botnet controller community. }Classic prog-brutforser. Passwords can iterate on different objects: POP3 (bruteforce soap) FTP HTTP (password guessing to the admin site, soap, and so on!) and a bunch of others! It features multithreading and adjustability. Passwords can iterate through the dictionary as well as everything the characters. Can work either directly or through a proxy (although the current one). A program every hacker must have in your arsenal. Site is in Russian, you’ll want to translate it. }MylaInstrument sent anonymously to send an anonymous soap and SMS. Want to send an email from a friend or address You here. }From here you can download ForensicZone, but, your anti-virus will stomp on it. Recommended. }A variety of organizations, institutions, companies, and countries seek to restrict Internet access from within their premises and territories. In general we seek to focus on those blocked pages likely to be most controversial -- for example, those blocked pages seemingly inconsistent with the criteria of the blocking regimes that respectively restrict their retrieval, as well as blocked pages that are well-known or frequently requested. However, to provide a more complete sense of the state of Internet filtering efforts, we also seek to investigate all blocking, including the restriction of access to web pages consistent with censors' category definitions. }this map is much more pleasant to the eye, compared to the other work-health-map-app listed here, but, is tricky to use. For example, if you click on their “full-screen mode” icon, the map/app takes off on its own, moving to different parts of the world and showing what diseases, etc., have been reported there, rather than simply going to full-screen mode. However, if you click on any area on the default map, it will report which diseases have been reported there and when. }the Human Rights Watch arms project. This page is about U.S. blinding laser weapons, but today it is the Chinese that are the largest makers and sellers of these sinister weapons. }We live in a world where infrared cameras can scan for drunks and the Federal Bureau of Investigation is sinking $1 billion into a new facial recognition program. Maybe it's time to start thinking like a master spy. For those of you interested in channeling James Bond, here are some straight-out-of-a-movie ways to avoid the surveillance systems all around you. You know -- just in case. And if you're not paranoid enough already, check out our gallery of the 13 creepiest apps around. }Human Rights First is working on several fronts to protect Internet freedom, including:
The Global Network Initiative (GNI): we helped launch and continue to actively support this multistakeholder initiative to protect and advance freedom of expression and privacy in the ICT sector. } was born in 2009 to provide affordable, durable and easy-to-use ID card solutions to all including schools, universities, hospitals, event facilities and Fortune 500 companies. Today, is a leading
provider of ID card printers, photo ID systems, ID card software, card printer supplies, ID cameras, RFID solutions and badge accessories. Partners Description
ID Security Online partners with only reputable and high performance industry standard brands and regularly inform customers of product updates and other
related topics through our blog. We carry an array of products belonging to each of the brands below, neatly categorized for easy navigation and accessible from the entire site. Please contact us if you have any questions or inquiries or click on the links below to go directly to the company’s homepage.
The “Netizen” project: maintaining free access to the Internet or communications tools is essential to the work of journalists, activists and bloggers around the world who use them to organize. Working with these netizens gives us a window into how to maintain that space. }another URL for the site, hackers for charity .org. }this site has recently (8/2011) been improved and works much better than it did before. }”About the International Committee of the Red Cross. The ICRC, established in 1863, works worldwide to provide humanitarian help for people affected by conflict and armed violence and to promote the laws that protect victims of war. }page one of how to decode your driver’s license. You can see what others see when they slide your card’s barcode. Note: although they call it “swiping”, that is not the correct word. That is, the word “swipe” already (and previously) means “to steal”; the correct word is “slide” or “slider”. }Snowden’s files show billions of pieces of phone & internet data plucked. By Glen Greenwald and Shobhan Saxena. Among the BRICS group of emerging nations, which featured quite high on the list of countries targeted by the secret surveillance programs of the U.S. National Security Agency (NSA) for collecting telephone data and internet records, India was the number one target of snooping by the American agency. }alas, the Internet Privacy Forum seems to have gone down on 12/27/11. We’re busy finding replacements links for it now, since protecting your privacy is a good way to preserve your Freedom. Nov. 2012 Update: we have these replacments: }tools and tech forum all related to internet privacy; and }”The World Privacy Forum has been active in the area of Internet privacy. Following are links to WPF resources, research, and links to other information. This list includes links to the Do Not Track proposal and the NAI report.”; and finally }”The PRIVACY Forum includes e-mailed messages and associated materials (along with an archive including some of these items) for the discussion and analysis of issues relating to privacy (both personal and collective) in the information age. Topics include telecommunications, information and database collection and sharing, and a wide range of other privacy issues, as pertains to the privacy concerns of individuals, groups, businesses, government, and society at large.” Free. }a global service provider and a leading advocate of sexual and reproductive health and rights for all; clean and simple website.
http://kpynyvym6xqi7wz2.onion } # Anarchy files and Underground links. For Tor network. }the Kuwait VPN (Virtual Private Network). iWasel is a VPN, Virtual Private Network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. iWasel creates a secure, encrypted tunnel through which all of your online data passes back and forth. }The most recent confrontation between the government’s interest in crime prevention and “people’s” right to remain silent under the Bill of Rights illustrates the widely accepted disparate view on liberals’ right vs. communitarians’ sense of societal security. At the same time, the discursive approach of the parties, and especially of the civil libertarians in Hiibel’s ongoing privacy case before the U.S. Supreme Court, showcases the “moral
geography” of the United States derived from the Cold War.nProfessor Paul A. Passavant’s book, NO ESCAPE: FREEDOM OF SPEECH AND THE PARADOX
OF RIGHTS, challenges the dichotomous approach to the relationship between liberalism and communitarianism. The author argues: “[T]he conventional
perspectives on rights neglect how recognizing rights for subjects also requires the production of subjects for rights” (p.xi). }freedom documents and historical materials. }Schedule 7 of the Terrorism Act 2000 is a breathtakingly broad and intrusive power to stop, search and hold individuals at ports, airports and international rail stations. Liberty is calling for Ministers to repeal this misguided and dangerous power. >> Find out more }For the low down on disappearing and starting your life over, we turned to the book How to Disappear: Erase Your Digital Footprint, Leave False Trails, and Vanish without a Trace by Frank M. Ahearn and Eileen C. Horan. Frank Ahearn is the grizzled grandfather of the vanishing act. After 20 odd years working as a skip tracer—an investigator who specializes in finding people who don't want to be found—he realized he could make just as much money and incur a lot less risk helping people avoid investigators like himself. We've culled a few of Ahearn's tips below, but if you're really serious, his book is a great pocket guide to getting lost. }"You look in the obituaries," Mr. Burton said, "in Topeka, Kan., say. You want a gas station attendant more or less your age. Once you get the date of birth, you call the county. 'Hi, I used to live in Kansas, but I've been living in American Samoa for the last 20 years as a Christian missionary. Any chance I could get a copy of my birth certificate?' "Should your ruse succeed and the certificate arrive, simply call a motor vehicle office and apply for a driver's license. "All you need," Mr. Burton said,"is one good piece of ID. The rest follows after that." }the Privatix Live-System (based on Debian GNU/Linux) is an easy to operate safe and portable system that can be booted from a cd-rom, an usb flash drive or an external hard drive and ensures your privacy and confidentiality while using the internet and communicating or editing and encrypting sensitive data, on anyone else’s computer. }this site is for those who are new to Tor and the “darknet”. Onion sites, so named because they end with “.onion”, are hosted as Tor hidden services – a completely anonymous way to host websites. They’re part of the deep Web – an invisible part of the Web that’s not visible to search engines and normal users. It’s full of websites for users obsessed with privacy and anonymity online. While browsing the deep Web, be careful what you click. While much of the content is no doubt entirely made-up, there’s some horrifying imagery you could see if you’re not careful – but then, there’s horrifying stuff on the normal Web, too. }information on Video Tracking Technologies and Identity Systems. }Skip blocking, proxy overshoot, and get rid of the blocking, proxy, the best service in PHP that, without ads, super fast connect to the Internet and free safety and the high-speed, Protect your identity online and protect your computer from hackers and viruses networks. Site is in Arabic or Persian, you can translate it. }the actual download page. }how to temporarily neutralize surveillance cameras using lasers. Also interesting info about lasers and their availability. }Samsung's positive buzz over the Galaxy S5 didn't last long - security researchers from SRLabs soon posted a video on YouTube demonstrating how they were able to trick the scanner with a fake fingerprint made of wood glue. Indeed, the same approach allowed a similar and well-publicised hack of theiPhone 5s Touch ID last year, the researchers from SRLabs said in their video. }here there are 15 video feeds from NASA; some live and some streaming. Recommended. Also }use this page for best results. Note: there are more websites like this one, on The Legendary Journeys Continue (tljc), here: . }K.A. Hamilton's "Freedom" link list. A nice set of links, most of them are still live or unbroken. }The National Coalition Against Censorship. They offer direct assistance to anyone confronted with censorship. }Founding Negativland member Mark Hosler has been invited by The Digital Freedom Campaign, a fair use advocacy group and broad-based coalition dedicated to defending the rights of artists, consumers and innovators, to travel to Washington DC as a “citizen lobbyist” to speak with various members of Congress about Negativland’s work, methodologies, and the bigger picture of a world where it seems like everyone these days is making collage. }A little background research: If you do intend to change your identity and you are not in any rush, I would suggest that you might want to spend some time looking at the study of genealogy (the process of tracing your ancestors). Maybe try and trace your own family back a few generations, finding their birth, death and marriage records. This will familiarize you with some of the processes involved, get you used to talking to clerks, etc., and maybe put you a little more at ease for when you start the process of creating a new identity. }new internationalist, issue 249 - November 1993: Sex and freedom: In one camp is the anti-censorship lobby.
In the other, anti-pornography activists. Catherine Itzin charts a path through the impasse in the debate on sexually explicit material. - See more at: }NNDB is an intelligence aggregator that tracks the activities of people we have determined to be noteworthy, both living and dead. it mostly exists to document the connections between people, many of which are not always obvious. A person's otherwise inexplicable behavior is often understood by examining the crowd that person has been associating with. The main page looks like a gossip page, with links to characters watched and their activities. }The myths and realities of identity change. Highly Recommended. }NO2ID is a campaigning organisation. We are a single-issue group focussed on the threat to liberty and privacy posed by the rapid growth of the database state, of which "ID cards" were the most visible part. We are entirely independent. We do not endorse any party, nor campaign on any other topic. We aim to publicise the case against state control of personal identity among the general public, in the media, and at every level in government. NO2ID's members are from all sorts of backgrounds and hold all sorts of opinions on other questions. They almost certainly include people much like you. }fine site from Rochester, NY. }their issue-specific Links page. } the Surveillance Camera Players – NY. }their group in Tempe, Arizona, for example. }important Freedom Link list, includes other link lists. Yes, you do have the time to look at this. }photos of nude people exploring San Francisco. It is a pay site, but there are free samples. }current naturist and nudism articles and legal information. }The indiscriminate and widespread surveillance, arrest and fingerprinting of peaceful demonstrators at the 2004 Republican National Convention drew a sharp response from the NYCLU. The organization released a report one-year after the RNC that documented crackdown on the lawful demonstrations and recommended reforms. It also challenged the NYPD’s mass arrests, blanket fingerprinting and prolonged detention of protestors in federal court. Through that lawsuit, the NYCLU gained access to various secret reports produced during the nationwide political surveillance operation the NYPD ran before the convention. }Offliberty lets you access any online content without a permanent Internet connection. Today many websites offer nice content but most are difficult to browse offline. If you have limited access to the Internet you can use Offliberty to browse any content later - being offline. If the Internet bus visits your village only once a week or your grandma doesn't let you use Internet more than 1 hour a day - Offliberty is for you. Offliberty DOES NOT host and has NO RIGHTS to any content. You must agree with our Terms of Service and other sites usage rules before you take them offline. Sometimes browsing offline content requires permission from its author or owner. Remember to be sure that you have it. We ARE NOT taking any responsibility for Offliberty users activity. }The digital age is transforming society: we believe it has the capacity to bring us greater democracy, transparency and new creative and social possibilities. But our freedoms are also under attack in the digital world: from governments and vested business interests. So we campaign against threats to your rights. We work on issues ranging from mass surveillance, to copyright, censorship, data protection and open data and privacy.  We do this by talking to policy-makers and other activists and working with other campaign groups (both here and abroad). We raise the profile of these issues and present our arguments through conventional and social media. And of key importance, we mobilise our supporters take part in our campaigns, for example by contacting their MP. }Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). }The world's largest distribution network for proxy sites to circumvent Internet censorship 2.2 million subscribers as of August 2014. }be on the mailing list for the latest “circumventors”. Note: full list of proxy sites on the Online Tools 2014 List; but Tor and some proxy sites are here on this List. }lets you control who your computer "talks to" on the Internet.  By selecting appropriate lists of "known bad" computers, you can block communication with advertising or spyware oriented servers, computers monitoring your p2p activities, computers which have been "hacked", even entire countries!  They can't get in to your computer, and your computer won't try to send them anything either. And, of course, it’s free. }important for all of us to know, for our Freedom. “International cryptography freedom. This is a growing list. Contributions welcome; send to: . Please mirror this page, or scavenge it to make your own. Let us know about additional sites or your page and we’ll make a link. See also Cryptome for news.” The link to Cryptome is on this page. }Opt out of global data surveillance programs like PRISM, XKeyscore andTempora. Help make mass surveillance of entire populations uneconomical! We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services. }practicing integral transformative justice, they say. }the prison dharma network community. }Kodachi is a Debian based Linux distribution that comes with Tor, a VPN and DNSCrypt. The desktop is a customized Gnome with custom scripts that let you manage everything using a good looking graphical interface. With the open source system monitor utility Conky you can see real time information about your live Internet connection. Assigned VPN IP, Tor country exit node, open ports, CPU and RAM spikes as well as bandwidth consumption are all shown in the background as you surf the Internet. Secure cloud providers are integrated with the distro, you can access Dropbox, SpiderOak or Wuala to upload files to the cloud. Very useful when running a live operating system and you need to save data without leaving tracks behind. I normally use my email Inbox to do that but a cloud account is more suitable for big files. }a non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk. See also JKU Web Tools. }Freedom links with a libertarian slant. } The 2.4Ghz project uses a wireless video receiver to hack into wireless surveillance cameras. This device (which is now part of consumers popular products), can be used for wireless surveillance cameras, but it can also be used for parents to monitor their children. Such systems are becoming more popular as they get cheaper. But what most users of those devices don't realise is that they are broadcasting the signal. This project (on-going) has several layers. Initially, I have been walking around different towns in Europe to collect and record footage received with the device (see below for the collected movies). the project consists of a series of workshops: 2.4GHz Workshop, where participants are invited to explore the CCTV wireless networks of their city by searching for 2.4GHz surveillance video signals. The location of the various signals found are collected into a Google map (See Below). }Reporters Without Borders’ activities are carried out on five continents through its network of over 150 correspondents, its national sections, and its close collaboration with local and regional press freedom groups. Reporters Without Borders currently has 10 offices and sections worldwide. Reporters Without Borders is registered in France as a non-profit organisation and has consultant status at the United Nations and UNESCO. }an example of a good naturist/nudist site. Nudism is, of course, an example of freedom and a good use of it; but it is not sex, and does not belong in the sex category. The nude human figure is not sex, and it is useful for everyone to bear that in mind. }older news, but still really relevant. See also: }a positive use of surveillance. }The world's largest distribution network for proxy sites to circumvent Internet censorship. (See also Online Tools 2015 for more proxy sites.) }instructions how to install the Circumventor program which gets around all web blocking. }this page has important news about your privacy, violations of it, your constitutional rights, and those who advocate and take other civil action on your behalf, for your freedom and privacy. }Privacy Rights Clearinghouse (PRC) is a nonprofit consumer organization with a two-part mission -- consumer information and consumer advocacy. It was established in 1992 and is based in San Diego, California. Excellent and interesting articles, and more. }Targets of the Surveillance System: Activists
Who else is under suspicion in the 21st century surveillance state? Leaked information and Freedom of Information Act (FOIA) lawsuits have revealed that in one sense little has changed since the days of COINTELPRO. }RAW is deceased now, but, he was very concerned about Freedom, mine and yours, and this website will prove that to you. From here you can get good ideas, link up with others who want freedom, and so on. Recommended. }of course, don’t miss his linklist. Some of the sites he links to a little more serious… it’s not quite all humor with RAW. For instance, when he just didn’t and couldn’t feel free enough in the U.S. anymore, he moved to Ireland – for the rest of his life. Took Freedom seriously. }The 2.4Ghz project uses a wireless video receiver to hack into wireless surveillance cameras. This device (which is now part of consumers popular products), can be used for wireless surveillance cameras, but it can also be used for parents to monitor their children. Such systems are becoming more popular as they get cheaper. }I decided to go ahead and use this list to collect removal procedures from ALL of these websites and provide direct links or instructions to do so. The following list was provided as being the "big boys", so if you remove your name from these ones then all the smaller "sites" should fall afterwards.
How to remove yourself from each of these have been listed below. I would recommend that you scan some form of ID such as a state issued ID like a drivers license. Black out your picture and drivers number. Leaving your name, address and DOB visible. Any sites that requires such a thing will have an * after the address. }Aerosol and Electromagnetic Weapons In The Age Of Nuclear War By Amy Worthington , 11-21-4. 2015 DL. }Radio Free Europe: Radio Liberty. See also the Research List for all the radio sites. “RFE/RL journalists report the news in 21 countries where a free press is banned by the government or not fully established. We provide what many people cannot get locally: uncensored news, responsible discussion, and open debate.” } The Hungarian National Association of Radio Distress-Signaling and Infocommunications (RSOE) operates Emergency and Disaster Information Service (EDIS) to monitor and document events on Earth which may cause disaster or emergency. Our service is using the speed and the data spectrum of the internet to gather information. They monitor and process several foreign organization’s data to get quick and certified information. Sample: }the disaster alert map for North America. (8/2011) }FinSpy, a surveillance tool designed to enable law enforcement to monitor computers in criminal investigations, is being used by governments around the world to spy on activist activity, a new report from Citizen Lab revealed Wednesday. The U.K.-based Gamma Group markets and sells the software to law enforcement ostensibly with the sole purpose of lawfully monitoring the computers of criminals — including pedophile rings, human traffickers and organized crime syndicates. The tool has, as Citizen Lab found, been put to broader and more nefarious uses by governments in countries including Bahrain, Ethiopia and Vietnam with “strong indications of politically-motivated targeting.” }An Open Decentralized Platform for Collaborative Search, Filtering and content Curation. Seeks is Free Software, and distributed under the AGPLv3 license. Through open code and data formats, Seeks allows you to regain control over your selection of results and to build a personal profile you can share with others. The easiest way to start using Seeks is to use a public node. A public node is an instance of Seeks which has been made available to the general public. Trusted public nodes allow a somewhat anonymous search and can be customized. See how to setup your own public web interface to Seeks. Please Contact them if you would like them to add your public node to this list. }Censor-ware exposed. }According to a six-month-long investigation conducted by Greg Palast for Al Jazeera, “voting officials in 27 states, almost all of them Republicans, have launched what is threatening to become a massive purge of black, Hispanic, and Asian-American voters. Already, tens of thousands have been removed from voter rolls in battleground states, and the numbers are set to climb.” }more Urban Beautification, also called Uncommissioned Urban Art. If that’s “vandalism”, then so are you. }By the official rules of billboards, someone pays rent on the sign for a time, and by doing so can put an image there that turns our neighborhoods into advertising supplements. }Culture jamming tactics can be put to use to further a political or activist agenda. }Elections can be jammed too, and frequently are both by wily political operatives and by people who enjoy messing with politicians. }San Luis Obispo. See also the High Weirdness Category on JKU PartDeux, , and Other on Part Deux }Anarchism is the belief that no government is just and that no government is therefore exactly what we ought to strive for. I don’t have the energy to put into a page dedicated to anarchism in all of its historical complexity. Luckily, there are a number of great resources on-line. This page lists a few of these resources, as well as links to writings by some of history’s more eloquent spokespersons for freedom. }Saint Mary’s College of California even offers a class in Pranks: Culture jamming as social activism. }To use SRLabs's fake fingerprint, an attacker simply places the wood glue replica over the tip of his finger and swipes as usual over the scanner, which is embedded in the Galaxy S5's home button. The wood glue is poured into a mold made out of a laser printout created from a photo of the victim's fingerprint. With the right image contrast and printer settings, the buildup of toner on the printout creates a 3D representation of the fingerprint that is accurate enough to "cast" a replica that will fool the phone. }technical info on using Privoxy and Tor. This is for your freedom and privacy. See also JKU Web Tools. }you can download Privoxy for free from here. }Space Track. Run by the US Department of Defense, responsible for making unclassified orbital elements available to the public. This organisation has taken over the task from the OIG which was run by NASA. You will need to get an account to access the data. March 2013 Update: “This is the legacy site that has been retired. Please visit our upgraded site here: “ }”Welcome to the upgraded Please ensure that you understand the user agreement. “ For more websites like this, see also JKU, The Fall Harvest Edition here: . }We have a service that allows users to upload documents through a website and stores the uploaded documents encrypted on disk. The documents on disk are encrypted with a per-user key, which is randomly generated upon account creation.mThis document key is stored in a database field which is encrypted with the user's password as the key. When the user (owner) want to download a document, they need to provide their password, which is used to decrypt the document key which is in turn used to decrypt the document. We have chosen this pattern to negate the need to re-encrypt all encrypted documents when the user chooses to change their password: we only need to re-encrypt the document key. This setup work fine (and we think it is a secure pattern1). }Encryption is the transformation of data into a form unreadable by anyone without a secret decryption key. Its purpose is to ensure privacy by keeping the information hidden from anyone for whom it is not intended, even those who can see the encrypted data. For example, one may wish to encrypt files on a hard disk to prevent an intruder from reading them. In a multi-user setting, encryption allows secure communication over an insecure channel. The general scenario is as follows: Alice wishes to send a message to Bob so that no one else besides Bob can read it. Alice encrypts the message, which is called the plaintext, with an encryption key; the encrypted message, called the ciphertext, is sent to Bob. Bob decrypts the ciphertext with the decryption key and reads the message. An attacker, Charlie, may either try to obtain the secret key or to recover the plaintext without using the secret key. In a secure cryptosystem, the plaintext cannot be recovered from the ciphertext except by using the decryption key. In a symmetric cryptosystem, a single key serves as both the encryption and decryption keys. }site will tell you the date and year SSN was issued. }this site will tell you whatever you want to know about drugs, including news, and they have a mailing list. Unique site, and part of your freedom, to know about drugs, cartels, the DEA, etc. Click on “Drug Information” for an alphabetical list of drugs. There, you’ll find complete info about most drugs you might see, and some of that info comes from the DEA itself. Site is simple and easy to use. }the Surveillance Camera Players - SF. DL 2011 Replacement: See above. }check it out. This one has all the current tricks. }what "swipe" readers read. DL 2011 Partial Replacement: }this is sort-of what the lost website was about, but… Another partial replacement: }this one is also similar. }Digital certificates are electronic credentials that are used to assert the online identities of individuals, computers, and other entities on a network. Digital certificates function similarly to identification cards such as passports and drivers licenses. They are issued by certification authorities (CAs) that must validate the identity of the certificate-holder both before the certificate is issued and when the certificate is used. Common uses include business scenarios requiring authentication, encryption, and digital signing. }humiliating big-time criminals. We found this site a little hard to read an understand at first, so have added a couple of explanatory pages. }for example, some of their hijinks. }This is small reassurance for civil liberties activists. Testifying before
Congress about the expansion of CODIS, director of the American Civil Liberties Union’s Technology and Liberty Program Barry Steinhardt argued, “While DNA
databases may be useful to identify criminals, I am skeptical that we will ward off the temptation to expand their use.” “We have already entered the realm of
the Brave New World,” he said, urging Congress to “turn back” from expanding these databases further. Such critics argue that mandatory DNA sampling of
suspects and felons fundamentally changes the way government treats its citizens.“The state is saying, in effect, you may be a danger in the future because you
were in the past, and therefore we need to register your DNA,” Boston public defender Benjamin Keehn argued on PBS NewsHour. “If we are going to take DNA
from prisoners because they are at-risk [of committing crimes in the future], why shouldn’t we take DNA from teenagers, from homeless people, from Catholic
priests, from any subgroup of society that someone is able to make a statistical argument of being at-risk?” }A cryptographer has devised a way to monitor cellphone conversations by
exploiting security weaknesses in the technology that forms the backbone used by most mobile operators. Karsten Nohl, chief scientist of Berlin-based Security Research Labs, said the attack works because virtually all of the world's cellular networks deploy insecure implementations of GPRS, or general packet radio service. Some, such as those operated by Italy's Wind or Telecom Italia, use no encryption at all, while Germany's T-Mobile, O2 Germany, Vodafone, and E-Plus use crypto that's so weak that it can easily be read by unauthorized parties. }Wikileaks now has an online submission system for the first time since 2010. Accessible only as a Tor hidden service, the new page is available at wlupld3ptjvsgwqw.onion . (The Tor Browser can be downloaded here.) Wikileaks' previous system was brought down when a staffer named Daniel Domscheit-Berg split with Wikileaks founder Julian Assange over security issues. Domscheit-Berg held the encryption keys for all the documents received through the system, and ultimately destroyed thousands of submissions rather than let them be published in a way that might endanger the sources. }ThreatExpert's Statistics for HackTool.Win32.Crypt [Ikarus]: HackTool.Win32.Crypt [Ikarus] is also known as: (Threat Alias) (Number of Incidents) …,news-19297.html }Municipal wireless networks used by American police forces to link surveillance cameras and public loudspeakers may be easily hacked into, two researchers said at the DEF CON 22 security conference here yesterday (Aug. 8 2014). Dustin Hoffman and Thomas Kinsey of tech-support firm Exigent Systems related how the police wireless mesh network in a small California city had no security and could be accessed by anyone, raising the possibility that pranksters or criminals could use the system to their advantage, even by injecting bogus video feeds.,news-19291.html }How hard is it to hack into satellite communications? Not that hard, according to researcher Ruben Santamarta of Seattle-based security company IOActive. He's found a number of flaws in several widely-used satellite communication (SATCOM) terminals, the ground-based devices that communicate with orbiting satellites. Speaking at the Black Hat security conference in Las Vegas yesterday (August 7), Santamarta showed how SATCOM devices work and what kinds of flaws, including hard-coded credentials, backdoors and insecure and undocumented protocols, are present in them.,news-18340.html }basically advertising for TrueVault and TrueCrypt, but they might work for you. Joe-Bob says, check it out.,news-19290.html }LAS VEGAS — Google's Nest "smart" thermostats may be the most secure devices in
the "Internet of Things," but can still easily be hacked into, three researchers showed today (Aug. 7) at the BlackHat security conference here. Yier Jin and Grant Hernandez of the University of Central Florida, along with independent researcher Daniel Buentello, demonstrated that by holding down the power button on a Nest device for 10 seconds, then plugging in a USB flash drive, one can inject malicious software that can take over the device. }12 more things that you didn’t know could be hacked. Alas, nothing to protect the people from police violence; but some fun hacks: “smart” toilets from Japan; children’s “smart” dolls; home automation systems; more. }the homepage for The Tor Project. You do need to check this out, if you’re interested in freedom. See also Online Tools 2015 ( from JKU, in the Proxy Sites category.
http://torlinkbgs6aabns.onion/ }Tor Link Directory. }here’s the Tor Project overview. Note that the IE browser refused to show us this page, we had to use the Tor browser to see it. Tor and Privoxy protect your freedom and privacy, we highly recommend that you use both of them together. }Temple Of The Screaming Electron. }a little article about Carnivore. }their Fun List. }Found this pretty list online on a webpage that I cannot share for the content
it had, I filtered non-friendly links, and the list below is safe to browse but even though, they might change any moment so make sure to report in comments or contact me if you find anything that is not safe. I will make sure to update it. Click here for 2015 list . }”Here is the updated list of TOR sites, again I did not check every individual
site and I held no responsibility of what is inside, this page is just a reference for educational purposes, this post is a response to visitors asking
for a new updated list of the older one “Working Links List To Darknet Aka Deep Web .Onion sites” which is still useful too.” “I cleaned the most I can, also I don’t recommend doing any financial actions or interaction inside the darknet, it’s a bad place full of fraud so I recommend only checking for research or educational purposes ONLY, please report to me any links that have abuse or anything illegal as the content might change anytime, leave it on comments using Google+ or contact me on the contact page and I will get the link deleted, thank you. “ }a good idea, but for Firefox users only. a lightweight browser extension that helps protect web searchers from surveillance and data-profiling by search engines. }In Spain, public space is treated as the property of the State as opposed to a communal space shared by everyone. City councils dictate, to an excessive degree, what activities can and cannot occur in public space. Two exaggerated norms are the prohibitions against line-drying of clothes on balconies as well as sleeping on public benches. The notion that public space belongs to the State and not to the people reinforces the institutional value placed on private property and property ownership, and the division that such a value creates between the haves and the have-nots. When public space is increasingly regulated by the State, an unscripted way of living based on sharing and social interaction becomes problematic if not impossible. In order to reactivate spontaneous social cooperation and unexpected engagements with the cityscape, street artists interact unrestrictedly with the built environment instead of accepting the imposed, fixed relations of private property and normalized codes. }Hacks Against Corruption (HAC) is Transparency International’s first attempt to bring together technology and anti-corruption specialists to use technology to come up with some of the challenges we face in fighting corruption: visualising the cost of corruption, monitoring complex, massive public budgets and allowing citizens to safely report corruption in their life. }TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux. }online app that decodes your barcode. }the improved Swipe website 1/29/12. s }table that shows what’s in your barcode, by State or Province. }what's encoded on your Driver's License, by State or Province. }By opting out of these invasive background check and information database sites, you'll be taking the appropriate steps towards protecting your privacy. At UnlistMy.Info, we will provide a continually updated list of the top sites collecting your information, and instructions on how to remove yourself from their public listings. Check back often for new sites, and if you know of one that we don't, be sure to submit it! }Directions on how to remove yourself from the top sites are listed below. It is recommended that you scan some form of identification, such as your state-issued drivers license. Just remember to black out your photo and ID number. }hacking TSA airport scanners. }The wireless networks that cities use to link surveillance cameras are vulnerable to hacking, according to two security researchers who spoke at the Defcon hacker conference here. Police rely on these surveillance cameras and public loudspeakers to keep watch on areas of cities where they can’t always send patrols. Cities have been installing these systems with grants from the Department of Homeland Security. For some departments, this helps deal with budget cuts that reduce the number police on the street. They can set them up in parks, business areas, and other places with a lot of pedestrians. This means the cameras are like a “force multiplier” that enables one officer with a monitor to watch over many places at once. “I suddenly hear a voice saying, ‘This is the police. Please get off the fountain,'” Kinsey said. “The voice sound like he said it a thousand times before.” Kinsey and Hoffman looked into the networks and reverse-engineered some systems. In their city, they mapped out 122 cameras and their precise locations. They found that a lot of what they needed to hack a camera was freely available. The networks had almost no security, as the Wi-Fi signals were unencrypted (until three days before they gave the Defcon talk). }Dark net hacker markets are starting to look more and more like the e-commerce markets that exist everywhere else online, according to a report published by ​Dell. the market was “booming with counterfeit documents to further enable fraud, including new identity kits, passports, utility bills, social security cards, and drivers’ licenses.” Prices for highly-sought information and documents are
climbing, while other information is getting cheaper as hacking becomes more ubiquitous. }In Orwell’s worst nightmare he never pictured that a world leader would be making lists of people to be murdered by flying robots without offering evidence, charges or a trial.  That transnational corporations would treat governments as subservient contractors.  Or that our fingerprints, faces and DNA could be captured without our knowing about it, and reduced to digital data on massive supercomputers, for secret purposes, in our increasingly secretive government.” }The Wo/Men's Alliance for Medical Marijuana (WAMM) is a collective of patients and caregivers based in Santa Cruz, California. WAMM's unique model centers around providing hope, building community and offering medical marijuana on a donation basis. We offer a safe, organic supply of medical marijuana to patients with a doctor's recommendation. }We know that PRISM is a system the NSA uses to gain access to the private communications of users of nine popular Internet services. We know that access is governed by Section 702 of the Foreign Intelligence Surveillance Act, which was enacted in 2008. Director of National Intelligence James Clapper tacitly admitted PRISM's existence in a blog post last Thursday. A classified PowerPoint presentation leaked by Edward Snowden states that PRISM enables "collection directly from the servers" of Microsoft, Yahoo, Google, Facebook and other online companies. }Users and experts review online and mobile apps and platforms for privacy, security, and openness.  A Stanford Center for Internet and Society website with support from The Rose Foundation. }this app gives you visual locations of reported sicknesses, with symptoms reported shown by a symbol resembling a pie chart. In our test, it started in southern California, and by changing the zip code after selecting the “search” tap at left, we moved the map to northern California, although you can also grab and slide the map. In our test, we viewed Japan as well. Click on symptoms at the right to get the symbols to appear, or click on “how to use”. }How to Change Your Identity Three Parts: Changing Your Name, Changing Your Social Security Number, Using Your New Identity. If you're the victim of spousal abuse or are testifying in a criminal trial, law enforcement agencies have the ability to help you assume a new identity. To
learn how to change your name and register for a new social security number, read on get help yourself get a fresh start. }this site also shows some of what the swipe-readers read. }A darknet is a private, distributed P2P file sharing network where connections are either made only between trusted peers — sometimes called "friends" (F2F)[1] — using non-standard protocols and ports. Darknets are distinct from other distributed P2P networks as sharing is anonymous (that is, IP addresses are not publicly shared), and therefore users can communicate with little fear of governmental or corporate interference.[2] }A darknet is a private, distributed P2P file sharing network where connections are either made only between trusted peers — sometimes called "friends" (F2F)[1] — using non-standard protocols and ports. Darknets are distinct from other distributed P2P networks as sharing is anonymous (that is, IP addresses are not publicly shared), and therefore users can communicate with little fear of governmental or corporate interference.[2] }Hyperspectral surveillance is the implementation of hyperspectral scanning technology for surveillance purposes. Hyperspectral imaging is particularly useful in military surveillance because of countermeasures that military entities now take to avoid airborne surveillance. Aerial surveillance was used by French soldiers using tethered balloons to spy on troop movements during the French Revolutionary Wars,[27] and since that time, soldiers have learned not only to hide from the naked eye, but also to mask their heat signatures to blend
into the surroundings and avoid infrared scanning. The idea that drives hyperspectral surveillance is that hyperspectral scanning draws information from
such a large portion of the light spectrum that any given object should have a unique spectral signature in at least a few of the many bands that are scanned. }The NSA doesn’t just hack foreign computers. It also piggybacks on the work of professional for-profit hackers, taking over entire networks of already-hacked machines and using them for their own purposes. }software called EPPB or Elcomsoft Phone Password Breaker to download their victims’ data from iCloud backups. That software is sold by Moscow-based forensics firm Elcomsoft and intended for government agency customers. In combination with iCloud credentials obtained with iBrute, the password-cracking software for iCloud released on Github over the weekend, EPPB lets anyone impersonate a victim’s iPhone and download its full backup rather than the more limited data accessible on And as of Tuesday, it was still being used to steal revealing photos and post them on Anon-IB’s forum. }one page from the Project Renaissance website. Mind tools to help you keep your mind free, and to use and understand the links in this Category. }this explains a little about what the yes-lab does and what it is for. See the yes men, above. 2013 Update: }At the moment, the Yes Lab is mainly a series of brainstorms and trainings to help activist groups carry out media-getting creative actions, focused on their own campaign goals. It's a way for social justice organizations to take advantage of all that we Yes Men have learned-not only about our own ways of doing things, but those we've come in contact with over the decade and a half we've been doing this sort of thing. The Yes Lab has offices and work shopping space at NYU's Hemispheric Institute in New York. }website is, a community of people committed to social change. This is their Noam Chomsky page. Crowded page. Almost everything you could want to know about Prof. Chomsky. }a brief description of what Tor is and does. }online ZXing decoder. Decode a 1D or 2D barcode from an image on the web. Also links for mobile users.

II. Sex. Some sites are Explicit. (viewer discretion advised). }photos of the red-light districts in Amsterdam. This site isn’t typical of this list: it’s included for balance. It’s first since all of our Lists are in alphabetical order, within each category, and numbers come before letters in ASCII. }many of you will remember our old video list, which is now a separate document. Well, here is someone else’s suggestion for “steamy, sexy, or sensual movies”. The 15 at the top of the list seemed to have some porn; scroll down for the annotated, major motion pictures. }some of the erotic poetry of Alphonso Taylor here. }Anne of Carversville. She has the Sensualtiy News website; this is her Sensual Art & Fashion page. }brief article on the ancient oral sexual methods of the Kama Sutra. Ignore the ads. See also videos below for a film about the Kama Sutra, 1:53:13. }review: Sex. Drugs, and Democracy. The film may be dated (1994), so to speak, but the review article still makes valid points. } Better Sex Techniques from their certified board of doctors and psychologists; some good ideas. }video, healthy sex. DL 2011 Replacement link: }Joe-Bob says, check it out. }hotlink to one of the free audio samples. DL 2011 Replacement link: }apologies for the brief advertising at the beginning. Other replacement links below. }conscious loving for women, “Sacred Sexuality & Intimate Relationships”. }the homepage for Conscious Loving. }conscious loving resources page. DL 2011 Replacement link: }their top ten tips. }conscious loving relationships forum page.!tantra }he says, “sexual energy is the key.” }a somewhat older site, but “up” as of December 2014. Creative Erotica is a publication about art & design with a twist of sensuality.
Showcasing artworks on beauty, passion, lust, eroticism, pornography, fetishism and sexuality. Artists and creatives can submit their works, visitors and members then vote and choose the artworks to appear in the book. }this page discusses things to say during sex. }sex in the romance: a review of romantic encounters of the close kind. Have fun. }Ferri’s Highly Recommended Links. We forgive him for borrowing our notation. Some of these links are old and DL. }Erotic Mad Science Comics. Well, so check it out. }page describing and discussing Karezza techniques. }sex film portal. None of the images, films, or videos there have been reviewed by us. We haven’t checked the links, either, so in the next world, you’re on your own. }Healing Tao courses taught by Michael, Joyce, and others. These are “hands-on” courses in applying Taoist methods to sex. }a blog not untypical of “normal” conversations or opinions about sex. Included for balance. }one of the hotter film portals. WE haven’t reviewed any of the “contents” of this site, nor the links; we saved that part for you. }the mother of all erotic link pages. Art sites, photography, video, the works. Pick and choose what you like carefully! Site appeals to all tastes and preferences. This site has a huge number of links. }page 2 of their totally thorough link-list. ! }internet sexuality information service, for youth sexuality and reproductive health. }collection of various foreplay and sexual techniques. }black & white photos of sex workers from around the world. No they aren’t pretty; but they’re real and included in this Category for balance. Each photo is annotated: hover mouse. A good look a what it’s like outside of our U. S. }conscious loving relationships. They say, “We believe by training others to create and enjoy Conscious Loving Relationships,  we all move closer to a world filled with joy and peace. }the sacred sex revival campaign event has passed (2009) but their contact info is still on this page. }chapter excerpts from The Heart Of Tantric Sex; simplified presentation of current ideas. 2011 note: this site has changed somewhat since this list was first made. Check it out. }funny and hip site of Hong Kong film webmaster Ross Chen. }this is the replacement link for Sacred Sex (below). Karezza, Tantra, Sex Magic. }one of the karezza pages from the above site linked to. }this page has a review of a gay film by a Danish man. The review is thoughtful and intelligent. }ancient Indian sexual development methods called Siddhasana. }free to join this nudist dating and love hub. }friends, love, and romance with like-minded nudists. Recommended. }free sign-up for this site that allows nudists to meet and “interact”. }notes about human sexual growth. }site for the psychology of sexual emotion (contents at left). Page shown asks thoughtful questions and answers. }er, a 19th-century philosophers views on sex and the emotions. }erotic poetry reading, plus introductions and explanations, etc. 28:02. From San Francisco. }here is their list of erotic poetry and prose podcasts. Listen or download and enjoy. }photos from the series, sex positions for singles. Recommended. }a collection of Erotic Sex Poems. }invites readers to submit videos to be used a sex-education for students. }literary erotic webring (scroll down, click on title of interest, it goes to site). DL 2011 }this is a select directory of erotic professionals. You can search by location, category, or sex for Classes, Workshops, & Retreats. Love and Intimacy, Sacred Sexuality, Sensual Touch , Tantra and Tantra Techniques. We thought this was a new site, since the search engines never found it before, but its been there since 2005, 7 years ago. }this site has quotations from sacred literature throughout the ages. Really good site if you’re into sacred sex. Recommended. They also have a nice link to Gnostic Retreats and Gnostic information here: }also a glossary there for those who want to know, or those new to Gnosticism. Note: sometimes the browser won’t load this page. Then you could try: }and use the Meetup site to find others in your area. For example, there’s one in Miami. So, you’d have to sign-up on the Meetup site, but that’s quick and easy. }a Sacred Sex campaign. DL 2011 Replacement link above under londonfestival. }the Sacred Sex Revival. DL 2011 Replacement link above. }article about "the conscious sex movement". }collection of 1,775 articles about sex. 2011 update: this is now 6,960 stories about sex. }"Angels of Sex", about, uh, "sacred sex workers". }Part Two of article. Like, ancient temple sex workers. Not the "P" word. }scribd has tons of documents about conscious loving. }Sensual Erotica is a website with great quality porn for women. We work hard everyday to bring you erotic videos and erotic stories which are created for women and couples! Our site is filled with passionate, erotic and sexy content for women and adult couples. We offer a selection of erotic dvd sets that are created with women in mind. Note that the videos, etc., are mostly heterosexual. }features photos, short videos, and so on. This Sensual Freedom site is on Tumblr. We don’t like Tumblr, since they make it very difficult to upload images, but, these are images relevant to sex and sensuality. }this site is the most organized of all the ones teaching sexual positions. These are illustrated by small photos of actual people, not graphics. You can search or select by a variety of criteria, including duration, skill level, effort involved, and the collect a profile of you and your partner, so that age, weight, height, are also criteria. Clean site, no actual sex shown. It looks like a new site to us, but netcraft says its been there since October 2005, 7 years ago. }this site has lots of sensual eye-candy. Highly Recommended. Explore. }her new wide-screen video page. }collection of sexual positions and techniques from 5 ancient Asian sex treatises. Explicit drawings. Ignore ads; also workaround full-page ads. }good, brief descriptions of various sexual techniques and issues, but nothing in-depth. Maybe good for teens to read, or others new to sex. }Sex search engine. The Language of Love, Lust, Sex, and All the Many-Splendored Things in Between in Teenspeak - Jockspeak - Menglish - Slanglish - Spanglish Gaylese - Americanese - Britspeak - Ozslang - Funetic Populo-Vulgar Speech - T-Shirt & Net Shorthand Pompo-Verbosity & other Figurative Lingos. Enter a Word or phrase, select the dictionary and click the search button. }another site mostly for beginners, or the bored. Explicit descriptions. }commercial site w/links to 4 other technique-sites. }commercial site w/explicit photos. }a “how to” guide for, uh, well, you know. Well, we don’t know if you need instructions or not, we’ve included this, you know, just in case. }features free audio sex samples. 2011 update: site and page are still there, but they seem to have withdrawn the free samples. }brief article, that is like an advertisement for a course that would teach one the one hour orgasm method. }If we use sex as the example it’s easy to see how each of us has our own brand and flavor of pleasure. Anyone that has ever had a sexual relationship with another person knows that they didn’t always get their needs met. One person might want to have their feet rubbed while having oral sex while another might want, or maybe even require, being pinched while engaging in some form of sex. It’s all up for grabs but what is true of each of us is that we each drive the experience via the means that we grew to “like” in our brains and nervous system. That means we trained ourselves to have certain experiences that then become necessity if we are to “get-off”. }It turns out that our notions of what ‘wild lands’ are, or more accurately ‘were’ in the past, isn’t very accurate. Large herds of animals recreate the landscape on their own, without any of our human, artificial input. That land now looks like vast, open savannas rather than closed, forested areas. Herds of large animals are forming that normally don’t herd together. There aren’t as many hiding places in the landscape so there is more exposure for all who live in this land. And all of this is blowing the scientists’ minds because historically we have thought that ancient animal life didn’t live like this at all. }smart sex guidelines, and information. }sex, sex humor, erotica: various stories. }Taoist sexual wisdom and methods. Old style site, with TOC from the book, descriptions, excerpts. }fine art nudity and erotica, including poetry. }healing the Feminine archetype, restoring balance between the Sexual Polarities & exploring Wisdom based living on a Global level. }site has ten pages of an article about porn stars in L.A. and The Valley, with interviews. No pics or videos or porn. }Temple Of The Screaming Electron's Erotica Section Index. }Temple Of The Screaming Electron's Erotica Section. }audio Erotica. Replaces above link(s). }audio Erotica. Plays in Windows Media Player. }audio Erotica. Ignore or skip intros and advertising at start. }audio Erotica. This one was recorded for Valentine’s Day. }you really have to see this site for yourself, we don’t know how to describe it. }descriptions of the different kinds of kisses. }this site consists entirely of animated gifs, depicting the various types of sexual activity. We think that you might like this, all types of sex are shown, and some novelty gifs, some not sexual at all, some, e.g., anime, etc. }this urban dictionary has various sexual terms defined. The definitions are short and are not illustrated, and not all of them are serious. Enjoy. DL 2015. Replacement: }sexual activities, including various forms of sexual intercourse and other sexual acts between people. Sexual acts are generally described by the positions the participants take in order to perform those acts. **listing of Sexual positions** . }my friend Ravel Patel contributed this word to the Urban Dictionary: }A person who is sexually attracted to the intelligence in others.
I told her, no, I'm a sapiosexual: I'm attracted to your intelligence! by Ravel Patel October 20, 2011. }this is the page that has all the audio samples. Five are listed above, and a 6th near the top of the list. }this site describes and celebrates the World Naked Gardening Day. }What can I say, except that I am a very happy bunny! Here is the first advance review for Freedom, the first in my series of erotic romances writing as Luna Ballantyne….

III. Music and Video. This edition of JKU features replacements for links from previous Lists that have died. In some cases, the original work has no current hot link, and for these, a substitute is provided. New and Old music is featured as well.
Music: }Moby. Cut=? (mix) (replaces "Next is the E".) 2012 Replacement for “Next Is The E”: . Note: when you get to this folder, you’ll see two different mixes of Next Is The E, which are free to listen to or download.
Replacement links for the Plastiscines:
}the Plasticines en Francais.  }requires Flash 9; low res. DL 2011 Here’s a replacement link: }Loser. 2:45.   }audio from them. }here they cover Lost In Translation, again in English. }here’s a better version of their cover of Shake, Shake. 2:01.   }One of these days these boots...; The Plasticines; low res. This is a bootleg of an all-girl band from France; these college-age women cover the song, These Boots Are Made For Walking. Of course, the bootleg is lower-quality audio and video.    }Mr. Driver(cover); better quality. DL 2011 2012 Replacement: }they also perform Shake, Shake, along with Mr. Driver, in this video, 6:44. }a little documentary, 2:46, about the Plasticines. }this is the original Nylon magazine video that the above little interview was about. 3:22.    }alt. version of "Loser" (NYC)   }a little movie about The Plasticines. This is the new (2011) URL for it: }the do a nice cover of “Shake, Shake”. They cover “Driver” also, low-res. Unfortunately, Daily Motion has started inserting ads into “their” videos. }here they cover “No Way”, audio with stills. 2:00. }here is their Zazie Fait de la Bicyclette, audio with stills. 2:25.
Old Music:   }Bach. DL 2011 There are no free links for the League of Crafty Guitarists anywhere on the World Wide Web. So, here is some Robert Fripp instead: }Refraction 6:28.
2012 Update: You can now find many cuts from Fripp and the League of Crafty Guitarists here: }for free.
Replacing lost Robin Williamson link:    }ISB, Job's, of course, Tears. 2012 Update: You can now find most of the Icedible String Band and Robin Williamson cutes here: }for free.    }some, basically, King Crimson. DL 2011 2012 Update: Now you can find some of the best King Crimson cuts here: }for free. }here’s the replacement URL for that, you ungrateful, undeserving fuck.
New Music: }The View. DL 2011 No replacement link is available. 2012 Update, since the name of the band is lost, it is impossible to find this song. The ones we heard were from other bands, sorry. }The Dead Science: Threnody. DL 2011 No replacement link. 2012 Update: this song is very, very difficult to find. So, we recorded a copy of it for you, which you and find here: }Threnody, by The Dead Science. In this same folder, you’ll find the Hiroshima Love song by them, as well as a few other cuts on this list, or others. }Bright Eyes. DL 2011 Replacement link: }Haligh Haligh. 2015 DL. Replacement: }on Jone’s onedrive.    }fripp and the league. DL 2011 It is nearly impossible to find any audio files of Fripp and the League for free on the web. However, as replacement we offer this link, that allows you to listen to short samples of their HQ work: }longer samples, and }greater selection, shorter samples. Amazing work. 2012 Update: You may now find selections of works by Robert Fripp & The League Of Crafty Guitarists, here: }these are complete works, free for you to listen to or download.
New Age Music:--------------------------------------------------------------------------------------- }select collages from Angelic Music, Interdimensional Music, and Essence of Spring; no direct link available to Iasos music; must visit site and select. }lullabies; replaces lost Bill Douglas link.
Videos: August 2012 Update: The sex videos have been moved to a separate document now. The Freedom videos are still here, and the sensual videos, and those containing no actual sex. Contact us if you want the sex video list.
I. Freedom. }instructions on how to surf the web anonymously. 3:06. About Tor. }video of activism by the Surveillance Camera Players. 2012 Update: URL now goes to the download location for this video. Recommended to watch with VLC or your favorite media player. }this URL should go directly to the video. A woman making her masterpiece graff wall. 3:46. }2001 interview with SCP (the Surveillance Camera Players) in Times Square, in Duffy Square. 1:20. }excerpt from a walking tour of NYC surveillance cameras, 7:27. SCP. }SCP Headline News, starts after 30 seconds. 2:36. No audio, excerpt only. }SCP: watching the watchers, and performing for them. 4:36. DL 2011 }Critical Art Ensemble, 1:14:52. Story of what happened when their founder’s wife passed away while he was preparing an exhibition on genetically modified food for the Massachusetts Museum of Contemporary Art. }CAE’s performance in Germany, Target Deception, 6:43. }A new breed of revolutionary stands poised along our information highways waging war on logos and symbols. They're "Culture Jammers" and their mission is to artfully reclaim our mental environment and cause a bit of brand damage to corporate mindshare. Trailer, 2:02. }are north Americans minds being held hostage by the advertising industry? 6:06. These are some of the original “culture jammers”. }Mcdonald’s culture jam montage, 1:13. Volume warning. }although the AdBusters claim to have started Culture Jamming, in our opinion no one ever did it better than Negativland. They were the best at that; Highly Recommended. 3:34. Music by The Swingle Singers, see also . For Negativland, see also . }Culture Jamming mini-documentary. 4:52. }The Masters. A little taste of Negativland to show you who was, The Best at jamming. 3:13. }Art in a time of Terror – 3/3, from Democracy Now. 7:19. }GenTerra is a performance by Critical Art Ensemble and Beatriz da Costa. GenTerra is the name of a company dealing with "transgenics" - the isolation of one or more genes from one or more organisms to create another, new organism. Products created through this process - for example, transgenically modified foods - have often caused controversy. GenTerra claims to produce organisms that help solve ecological or social problems. 5:57. }the video about privoxy, maybe watch on full-screen. Not a tutorial, just shows how the site and app works. 3:10. Words to the song seem to not be in English. }instructive video on what Proxy Servers are. 2:57. }a tutorial on how to set up a proxy server. 5:15. }video on how to get started with both Tor and Privoxy. 2:51. Interesting background music. Watch on full-screen. }video on the Tor network and how to hide your IP address. 7:32. }NDS browser using Privoxy and Squid. 6:45. No audio, shows actual screens in use. }a short video, featuring a subway train filled with green apples. 0:30.! }A European Investment Bank (EIB) that would cease lending to coal projects and eventually all fossil fuels is still a dream. However we imagined it for one day and the effects would be tremendous. The EIB could play a leading role in decarbonising Europe's energy infrastructure, it would be applauded by EU citizens and receive rewards from organisations like ours. That's what we wanted to show with our day of action during the Bank's annual press conference. All we call for is EU public bank that acts with the future in mind by taking the EU 2050 decarbonisation targets into account. Let's hope it will when it reviews its energy policy later on this year. 3:14. }After a fake press release in which the EIB 'announced' its divestment from coal, activists stroke again the next day during the Bank's annual press conference. In name of EU citizens, President Werner Hoyer received the 2013 'World Coal Down' award. Unfortunately he had to enfeeble the rumours of the EIB's coal divestment, saying it was "complete nonsense". Check the rest of the story on our website
This video has been produced with the financial assistance of the European Union. The contents of this video are the sole responsibility of Counter Balance and can under no circumstances be regarded as reflecting the position of the European Union. 0:47. }the yes men fix the world, 1:35:40. This is the complete movie, but on you tube you can view it in sections, or view excerpts or a trailer. }Andy Bichlbaum, of the Yes Men, gives us a behind the scenes primer on how to pull off a high level prank, 6:50. Civil Disobedience, and using the Media for change (i.e. enemies weapons against them; see also Negativland, Jam Art, Grafitti, etc.) }the yes men reporting the news of the Bhopal Disaster. 5:52. }the Yes Men confront the U.S. Chamber of Commerce, 6:06. Eric Wohlschlegel confronts Hingo Sembra (AKA Andy Bichlbaum of The Yes Men). Which one legitimately represents the right way for American business? }the Yes Men, post consumer waste recycling program, at the WTO. 7:19. The Yes Men Impersonate McDonalds and WTO spokespeople at a class lecture. }the Yes Men, with the help of Bill Moyers on PBS. Seriously. 3:24. (Bill Moyers gets in on the joke with two impersonators who use satire to make serious points about media consolidation, journalism, business ethics, and separating fact from fiction in a world of spin. The Yes Men - aka Mike Bonanno and Andy Bichlbaum - who discovered that pranks could get press attention to important issues that would otherwise be ignored.) }Democracy Now with the Yes Men, 10:00. (The Yes Men have struck again. On Tuesday, a man claiming to be a representative of Halliburton gave a presentation at the "Catastrophic Loss" conference at the Ritz-Carlton in Amelia Island, Florida. Conference attendees include leaders from the insurance industry. We speak with the Yes Men's Andy Bichlbaum, who took part in the hoax. )
II. Sex. }video about a new sex museum in Russian. 1:20. Unique. Recommended. Note that this video belongs to both the Freedom and Sex Categories. }In the midst of the repression and political unrest of pre-Spanish Civil War, eccentric artist Salvador Dalí and renowned poet and revolutionary Federico García Lorca find their artistic and sexual freedom. Note that this video belongs to both the Freedom and Sex Categories. 1:14. }promo for Alphonso Taylor’s book, Sexual Freedom. 2:14. Note that this book belongs to both the Freedom and Sex Categories. }has freedom in sexual consent affected justice? 2:55. Also, what is true sexual freedom? Note that this video belongs to both the Freedom and Sex Categories. }the young turks (panelists/hosts) discuss an alternet article, 6 reasons why women should have casual sex. 3:56. }sexual freedom: is it possible? Is it natural? By Kenya Stevens. 1:38:46. A radio talk-show with visuals, opens with a jazz song. Note that this video belongs to both the Freedom and Sex Categories. }for this video, the titles are in French and Spanish, the notes in Spanish. What is it? It’s a video excerpt from a film, in which a couple kiss, and do things with theirs mouths. 4:50. You might like this. They do enjoy a long kiss together, often in slow motion. }excerpt from 9 ½ weeks; video is loud, be careful. 0:09. }front page video features women removing their underwear, or trying to. August 2011 Update: You may have to hunt on this site for that video short now. This page contains nudity, viewer discretion is advised. }Kim and Michael having some fun. 0:44. Somewhat low-res. }scenes from The Getaway, Kim and Michael. 3:59. }here a woman gets a wonderful massage from an excellent masseur. 5:10. That is, no sex in this one, but very sensual. Recommended. }Madonna: Dance, Sex, and Personality: a Tribute. 4:12. Low-res, but still worth it. DL Sep 2012 Blocked by FBI. Nov 2012 Update: you tube has a copy of this video, but it is banned in the U.S. Use a foreign ISP to view this video. }found here using a Chinese ISP. 4:13. Recommended. You can also download or view it here: . Note that sometimes skydrive won’t hotlink to the video, but the page will open with the video selected; click on it to view or download and then view. 6oct13 Update: Link went directly to the video, and the browser started playing it. }longer, clearer excerpt of Reckless with Daryl Hannah and Aidan Quinn. 6:12. Recommended. DL Sep 2012. Replacement: }watch it here. } Gwyneth Paltrow, Shakespeare In Love. 3:42. }higher-res version of the same scene, 0:30. }sensual, amateur striptease, 2:12. }short scene with Kim called Door in the Floor, 0:10. 2012 Update: This video page loads but then the video doesn’t play. So, we have this replacement link for you: }kim and jon foster, 0:33. }kim in door in the floor, 0:20. }Madonna, Dance 101. 4:29. Recorded through a Dutch ISP. Recommended. This one is viewable in the U.S., or here: . Apologies for the low-res original. Note that skydrive won’t hotlink to the video, but the page will open with the video selected; click on it to view or download and then view. }interview with Daming Chen, director of What Women Want. Mr. Chen speaks English well, which is then translated into Italian. 12:39. }what women want, part one, with english subtitles. 14:42. }video montage from Pretty Baby. Recommended. 3:56. }Blue Lagoon video montage, 8:31. Highly recommended. 2012 Update removed by youtube! However, we have a replacement here: }Laguna Blu , 8:30. This is the best of its kind on film, do enjoy this one. Note: skydrive won’t hotlink to the video itself, so, when you see the list, Laguna Blu will be highlighted and selected. Then just right-click and download (save or open)! }Jennifer Connelly in the Hot Spot. 2:21. With Don Johnson. }Kim in a fun scene with Mickey Rourke. 4:11. Music by Randy Newman. }Kim and Mickey enjoy some food and drink, 3:08. }Aphrodite underwater, the making of it. Recommended. 2:47. }some fashion models, doing sensual work in this vid, 3:00. Recommended. }asian massage. Enjoy. 3:47. }a “realistic” love scene, starring Ashley Judd and Jeffrey Donovan, some consider beautiful . 3:59. Recommended. }a sensual video, this has no sex in it. 5:00. Lingerie. }a video about the Kama Sutra. 1:53:13. An Indian film made in India. DL 1/2012. It appears that youtube has removed this video from their site. However, we have been finding portions of it, and also similar films, for you to watch. For example, }the concubine in Indian history, 1:53.

FAQs (of this Cold List)

1. Q: What do those crazy art sites have to do with freedom?
A: No.
2. Q: Do you have any audio-only by the Plastiscines?
A: Sure. See "Music", above.
3. Q: Is spiritual sex the same as Tantra?
A: Not really.
4. Q: If I'm consciously in love with my sexual partner, is that Tantra?
A: Not necessarily.
5. Q: So, what is Tantra?
A: Compare }Their pretty-good article.
6. Q: Then what is Tantric Sex?
A: The point is that most of the Website authors who talk about Tantric sex are
newbies" and, well, "uninformed" for lack of a better term. Hint: they talk too
much about it, and talk like they just discovered it yesterday. Still, though, you
can look at if you like. 7. Q: Why have you done a Sex List?
A: Because we have already done all the other interesting Lists; this is the end.
8. Q: Where did JKU Review go?
A: It is now a separate document, the JKUIndex2012.
9. Q:Why are so many of the links to music and videos dead now?
A: Since they were originally collected in January, 2009. Links expire without warning.
10. Q: Why are there sex videos on this list?
A: (Mr. Kamel) We always have videos on our lists, except for the research lists.
A: (Dr. Dae) Since there are only two categories on this List, Freedom and Sex. We have freedom videos on there too, just look for them.
11. Q: What is “graff”?
A: “Graff” is, of course, the short and commonplace form of the word “graffiti”.
12. Q: We enjoyed watching some of the sex-videos. They go well with the Sex Category, and with the URLs there. Do you have any more like those we saw, or different ones?
A: Yes, we have more of them for you to view, if you like. We’ll send the complete
list of them to your e-mail address. Enjoy.
13. Q: So, why did you move the sex videos to a separate list?
A: For the convenience of you, our dear fans and readers. This List still has the sensual videos, and the Freedom videos as well; and you can have the sex videos by special request, if you like, or find that list here: . Remember, these are just links to the videos, not the videos themselves. Also, you could try this adult film portal }if you wanted to.
14. Q: I noticed above, that we would contact you to obtain the sex videos. I’m into sex videos, and would like those links again? What is your contact info?
A: Mr. Jae Kamel:; Dr. Jone Dae: .

No comments:

Post a Comment