It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
This is truly an ironic situation. We have been fighting for a free world, and our opponents are mostly huge corporations from the United States of America, a place where freedom and freedom of speech is said to be held high. At the same time, companies from that country is chasing a competitor from other countries, bribing police and lawmakers, threatening political parties and physically hunting people from our crew. And to our help comes a government famous in our part of the world for locking people up for their thoughts and forbidding access to information.
The Pirate Bay has been hunted in many countries around the world. Not for illegal activities but being persecuted for beliefs of freedom of information. Today, a new chapter is written in the history of the movement, as well as the history of the internets.
The Pirate Bay has been hunted in many countries around the world. Not for illegal activities but being persecuted for beliefs of freedom of information. Today, a new chapter is written in the history of the movement, as well as the history of the internets.
More at the link , this is truly astonishing! Now I just hope that this isn't some kind of lure to the demise of thepiratebay.
"Many of you need to be more critical," "Even towards us."
"You can't seriously cheer the 'fact' that we moved our servers to bloody North Korea ... Always stay critical. Towards everyone!"
fale@machine:~$ tcptraceroute -f 128 -m 128 thepiratebay.se Selected device venet0, address 5.9.249.8, port 40771 for outgoing packets Tracing the path to thepiratebay.se (194.71.107.15) on TCP port 80 (www), 128 hops max 128 thepiratebay.org (194.71.107.15) [open] 51.673 ms 49.002 ms 47.187 ms
That server is in Germany, no way it's possible to have 50ms to NK. Also traditional traceroute has 500ms+ RTT. They are faking/spoofing the ICMP responses. They are also prepending their route advertisement with corresponding AS paths to further disguise it.
From TeliaSonera looking glass lg.telia.net... 194.71.107.0/24 *[BGP/170] 02:10:36, MED 0, localpref 150, from 80.91.255.255 AS path: 2914 39138 22351 131279 51040 I AS39138 is probably the real upstream provider of TBP.
They peer with AS51040(TPB network) and TPB router prepends AS22351(Intelsat) and AS131279(North Korean ISP) into it's AS Path before advertising it to AS39138.
Tom Paseka, an engineer at Web security company CloudFlare, confirmed to Ars that The Pirate Bay announcement is "almost certainly" a fake. Border Gateway Protocol is used to make routing decisions about how to move Internet traffic, and it's based on a "trust model" that makes it relatively simple to insert a bogus "autonomous system" or AS number into the route. "In this case, they've dropped AS131279, the North Korean backbone's network number, into the mix," Paseka said in an e-mail to Ars. "The routing is inconsistent with how AS131279 does their routing—they usually route via China Unicom, AS4837. The Pirate Bay's prefixes are not routed via this path."