reply to post by TOMFROMOZ
Right, because stating the facts as they are automatically makes me some sort of saboteur or spy to your "glorious cause of freedom". Your post, like
so many others, is dripping with romantic idealism yet little realistic thinking. All I'm doing is stating the facts. What, am I incorrect that our
enemies occupy some of the most powerful positions in our society, a society which they rule over? Am I incorrect that they abuse their positions, and
will use them and their power to maintain their positions at all costs?
You want to overthrow the evil tyrant of the kingdom. But your current plan is to go the town square, proclaim your opposition group out loud for
everyone to hear, and then invite people to join you. How can expect anything less than some of the king's lackeys and minions to grab you and take
you away to the dungeons for public dissent, disturbing the peace, and treason? Then maybe execute you, depending how much of a threat you actually
are.
I am not saying we should not fight. What I am saying is that we should fight smartly. For example, are you using an internet proxy right now to hide
your location? I am. If you tried to backtrace me, your computer would tell you that my IP address is currently 123.125.156.92 ...which is located in
mainland China (no, I am not in China).
Do you have an actual Facebook account? If so, how much of your personal information is on there? Your full name? Date of birth? Location? Family
members? Relationships? Place of study and/or work? Hobbies & Interests? From that alone, they could probably track you down, then have a head start
on cracking down on any other members of your movement. Dosen't matter if you have it all set to "private". A government agency could easily request
the desired information and Facebook would give it willingly. You're giving them a loaded gun, putting it in their hands, then lifting their hands and
aiming the gun at your head. How can you NOT expect them to pull the damn trigger? It's that simple. It's been done.
You seem to imply I don't do anything. On the contrary, I probably do more than you. I just use better tools. Allow me to share a few with you. Let's
see what you, since you appear to be highly motivated, can do with them:
Internet Relay Channels (IRC) - an easy-to-use method of realtime communication. Download a free IRC client (mIRC, Chatzilla, HydraIRC, Nettalk,
KVIrc, Colloquy, etc) and join irc.freenode.net or another server of your choice. Type /join #(name of room you'd like) to join and create a new room.
Invite participants and prospective participants. (P.S. If you've seen that old CSI episode where they feature IRC and give some sort of explanation
of it, let me tell you that it's total bull#. No one in their goddamn mind chats in "leet speak". Nor is it "sexy". Nor is that explanation of how IRC
works any good. It's all useless crap from the 90's.)
Free Mind: Free-to-use mapping software useful for organizing information of all sorts, visualizing relationships, etc. Go to:
freemind.sourceforge.net...
brief.ly...: An excellent way to aggregate links in a readable form. It makes a good landing page for coordination of operations or operational
briefings and the like.
tinychat.com...: Semi-anonymous video chat. Excellent for ad-hoc meetings.
www.chatterous.com...: Disposable web based IRC like chat rooms
www.chatzy.com...: Disposable web based IRC like chat rooms
jotonce.com...: Password protected quick message passing
www.graffitly.com...: Anonymous message passing system
pen.io...: Text based web page hosting; excellent for publishing documents
letscrate.com...: Drag & Drop file sharing
chi.mp...: Personal information aggregator. Good for harvesting and sorting through information of your choice.
www.thiss.is...: Allows you to create a site to argue anything, useful for testing ideas
www.icerocket.com...: Social networking search engine
secure...: Encrypted pastebin
www.cowurl.com...: Personalized URL redirection good for creating faux domains for projects or acting as a project entry point.
paper.li...: You can use it to create a "newspaper" from public social networking sources. Good for monitoring activity.
www.fakenamegenerator.com...: Generate shallow cover identities. These are not good for long term operations, and will NOT provide deep cover.
Still, it's always is good to have a few fake identities ready and waiting.
And that's all the simple stuff. The complex, real hardcore stuff is elsewhere. For example, there's Tor. That's the anonymity network used by people
who are deadly serious. How did PFC Manning transmit all his stolen data to Wikileaks? Tor. How do secret agencies transmit data? Tor, and some
government networks. How do pedophiles share child porn with each other without being caught by the FBI? Tor. How do terrorists communicate with each
other without being noticed? Tor, plus some posts on supporter forums that are written in code.
You get the idea.
You want to start a movement? Then think when you do it. Organize where they can't see you and monitor you. Because their is a damn difference between
what happens when an unstoppable force hits an immovable object as to what happens when an unstoppable force hits someone who THINKS he's an
inmmovable object.
edit on 10-5-2011 by Oberlin because: (no reason given)