Montagraph’s Cellular Telephone Demonstrations [VIDEO]

Today’s video compilation features Montagraph. In it, he demonstrates how aluminum foil and tin cans can be used as improvised Faraday bags to deflect RF signals. Unfortunately, they are not available on this YouTube channel anymore, and on the December 12th, 2014 broadcast of Lies Wide Open, he explains why his older material is not available anymore; yet, I do not believe that has the “right” to be forgotten.

[Download MP4]

How to Configure & Use OTR Encryption for Instant Messaging on Skype (Mac OSX Tutorial)

Off-the-Record (OTR) is a type of digital instant messaging encryption program. Instant messages (IMs) sent over the Internet, much like email, are akin to postcards, in that any third-party who intercepts them can easily read the contents of each message. Encrypted IMs would be analogous to a letter sealed inside of an envelope; while it is still possible for third-party interception to know whom both the sender & receiver are (that is, the metadata), they cannot read the contents of the IMs themselves. OTR uses end-to-end encryption, much like how PGP uses public key cryptography, without the use of a third party service provider who would otherwise not only be supplying the encryption, but also would be storing your decrypted messages on their server; with end-to-end encryption, its just the two users and the software they’re using between each other.

 

Adium + Skype = OTR encryption

 

While some OTR users would suggest that all IM users must always use OTR for every single IM, this is not always possible, whether because a user needs to communicate with an individual who refuses to use OTR, or because an IM is being sent to a group or public chat room, anyway. You’ll also need to consider how you and your associates will verify each other’s fingerprints, whether that be by encrypted email or VoIP, for instance.

The following tutorial will demonstrate how to configure OTR for the Apple Macintosh operating system using the Skype IM/VoIP service. Any other combination of software and operating systems are not applicable for this particular set of instructions.

 

The OTR Encryption Installation Guide

Before you get started, make sure you first have 1) a reliable Internet connection that doesn’t “time out,” 2) a good browser, such as Firefox, and 3) a Skype handle already configured with your Skype client.

 

Step 1: Download the Adium IM client.

 

Step 2: Download the Skype API plugin.

Skype API plugin

 

Step 3: Configure Adium with your Skype client. Click Adium on the menu bar, then select Preferences. Under the Accounts tab, click the “+” sign at the bottom of the window, select Skype API, and then enter your Skype login details.

Adium Preferences

 

Step 4: Find another individual who has completed the previous steps.

 

Step 5: Initiate an OTR chat with your associate.

 

Step 6: Verify each others’ encryption fingerprints. Write or speak your associate’s fingerprint to him, and once he confirms its accuracy, then your associate repeats this by writing or speaking your fingerprint back to you.

 

Step 7: Disable logging of OTR secured chats.

 

Step 8: Disable notifications of OTR secured chats.

 

Congratulations, you’ve successfully installed OTR; now you can send and receive encrypted IMs. If you’d like additional technical support with installing OTR as per this specific combination of software on a Mac OS, then feel free to send me an encrypted email using my PGP public key with the subject line “OTR Configuration Help” (and don’t forget to pass me your public key first!). If you’d prefer some additional guidance with using Adium’s OTR capability, then I suggest you also read both the Surveillance Self-Defense Project’s “How to: Use OTR for Mac” and Security in a Box’s “Pidgin with OTR” (just for comparison’s sake, if for no other reason).

How to Configure & Use PGP Encryption for Email (Windows OS Instructions)

Pretty Good Privacy (PGP) is a type of digital mail encryption program. Email that is sent over the Internet is akin to a postcard, in that any third-party who intercepts it can read the message. Encrypted email is analogous to a letter sealed inside of an envelope; while it is still possible for third-party interception to know whom the senders and receivers are (as well as the content of the subject line), they cannot read the message itself. PGP uniquely combines both private and public key cryptography to provide the best possible “envelope” for your email communications.

In regards to privacy, you should keep a few items in mind when using PGP. Despite PGP encryption being still legally regarded by the central government as a munition, it is now exportable to other countries (provided they are not on the list of countries, groups, or even individuals subject to US export controls). The very use of PGP itself might attract digital surveillance by agents of the State, since even if they didn’t have a backdoor, they could still tell that you wanted to prevent at least casual decryption of your messages by third-parties; of course, if more people used PGP that would it make it that much harder for government snoops to surveil anyone.

While some PGP users would suggest that all users always use PGP for every single email, this is not always possible, whether because a user needs to communicate with an individual who refuses to use PGP, or because an email is being sent to a public email list anyway. Finally, you’ll need to consider how you and your contacts will exchange each of your public keys with each other (sending them in the form of a PGP key block or as an ASC file attachment via email is the least desirable, although there are a combination of digital and offline methods that can be pressed into service to provide at least a semi-secure transfer of the keys).

The following tutorial will demonstrate how to configure PGP for the Microsoft Windows operating system using the GNU Privacy Guard (which is the free and open source software implementation of the OpenPGP standard as developed by the Free Software Foundation), the Thunderbird email client, and the Enigmail plugin for Thunderbird. Any other combination of software and operating systems are not applicable for this particular set of instructions (if you want to install PGP for the Mac OS, you need to view this set of instructions instead).

 

The PGP Encryption Installation Guide

Before you get started, make sure you first have 1) a reliable Internet connection, 2) a good browser, and 3) an email address that uses a webmail provider (preferably one that uses POP3) that you would like to allocate for PGP encryption.

Step 1: Download the Thunderbird email client.

 

 

Step 2: Configure the email address you want to use with Thunderbird.

 

 

Step 3: Download and install the Enigmail plugin through Thunderbird (look for “Add-ons” under the “Tools” menu bar).

 

 

Step 4: Download and install GPG4Win.

 

 

Step 5: Create a key pair (which constitutes a public key and a private key) by using the same email address you configured with Thunderbird and choosing a passphrase that you would be comfortable typing every time Thunderbird prompts you, so that you can read your encrypted emails. While you could use GNU Privacy Assistant (GPA) or Kleopatra to create a key pair, these screenshots below show you how to do the same thing with the OpenPGP Setup Wizard (look for “Setup Wizard” under the “OpenPGP” menu bar).

 

 

Step 6: Export your public key and keep it on your hard drive as well as another copy on at least one USB flash drive (for the GPA and/or Kleopatra method, simply highlight the key by clicking on it, then click “Export,” and then choose where to save the ASC file).

 

 

Step 7: Find another individual who has completed the previous steps and exchange each of your public keys (preferably by trading the exported ASC files, instead of the PGP Public Key Block text). Once each of you have imported each other’s public key into either GPA or Kleopatra (and/or the OpenPGP Setup Wizard), then each one of you should send the other a test encrypted message just to make sure you have configured everything correctly (this is best done in person or over the phone, the latter of which either by landline, cellular, or VoIP).

Congratulations, you’ve successfully installed PGP; now you can send and receive encrypted email. If you’d like additional technical support with installing PGP as per this specific combination of software on a Windows OS, then feel free to send me an email (additionally, if you’d like to test whether you configured PGP correctly, also feel free to use my PGP Public Key, but remember, I’ll need yours first), preferably with the subject line “PGP Configuration Help.” If you would prefer some additional guidance with using GPA or Kleopatra, I would suggest you read the “GPG4Win Compendium,” and watch “GPG4Win Installation,” “GPG4Win Generate Keys,” and “GPG4Win Encrypting & Decrypting” video tutorials.

How to Configure & Use PGP Encryption for Email (Mac OSX Instructions)

Pretty Good Privacy (PGP) is a type of digital mail encryption program. Email that is sent over the Internet is akin to a postcard, in that any third-party who intercepts it can read the message. Encrypted email is analogous to a letter sealed inside of an envelope; while it is still possible for third-party interception to know whom the senders and receivers are (as well as the content of the subject line), they cannot read the message itself. PGP uniquely combines both private and public key cryptography to provide the best possible “envelope” for your email communications.

In regards to privacy, you should keep a few items in mind when using PGP. Despite PGP encryption being still legally regarded by the central government as a munition, it is now exportable to other countries (provided they are not on the list of countries, groups, or even individuals subject to US export controls). The very use of PGP itself might attract digital surveillance by agents of the State, since even if they didn’t have a backdoor, they could still tell that you wanted to prevent at least casual decryption of your messages by third-parties; of course, if more people used PGP that would it make it that much harder for government snoops to surveil anyone.

While some PGP users would suggest that all users always use PGP for every single email, this is not always possible, whether because a user needs to communicate with an individual who refuses to use PGP, or because an email is being sent to a public email list anyway. Finally, you’ll need to consider how you and your contacts will exchange each of your public keys with each other (sending them in the form of a PGP key block or as an ASC file attachment via email is the least desirable, although there are a combination of digital and offline methods that can be pressed into service to provide at least a semi-secure transfer of the keys).

The following tutorial will demonstrate how to configure PGP for the Apple Macintosh operating system using the GNU Privacy Guard (which is the free and open source software implementation of the OpenPGP standard as developed by the Free Software Foundation), the Thunderbird email client, and the Enigmail plugin for Thunderbird. Any other combination of software and operating systems are not applicable for this particular set of instructions (if you want to install PGP for the Windows OS, you need to view this set of instructions instead).

 

The PGP Encryption Installation Guide

Before you get started, make sure you first have 1) a reliable Internet connection, 2) a good browser, and 3) an email address that uses a webmail provider (preferably one that uses POP3) that you would like to allocate for PGP encryption.

Step 1: Download the Thunderbird email client.

 

 

Step 2: Configure the email address you want to use with Thunderbird.

 

 

Step 3: Download and install the Enigmail plugin through Thunderbird (look for “Add-ons” under the “Tools” menu bar).

 

 

Step 4: Download and install GPG Tools.

 

 

Step 5: Create a key pair (which constitutes a public key and a private key) by using the same email address you configured with Thunderbird and choosing a passphrase that you would be comfortable typing every time Thunderbird prompts you, so that you can read your encrypted emails. While you could use GPG Keychain Access to create the key pair, the screenshots below show you how to do the same thing with the OpenPGP Setup Wizard (look for “Setup Wizard” under the “OpenPGP” menu bar).

 

 

Step 6: Export your public key and keep it on your hard drive as well as another copy on at least one USB flash drive (for the GPG Keychain Access method, simply highlight the key by clicking on it, then click “Export,” and then choose where to save the ASC file).

 

 
Step 7: Find another individual who has completed the previous steps and exchange each of your public keys (preferably by trading the exported ASC files, instead of the PGP Public Key Block text). Once each of you have imported each other’s public key into the GPG Keychain Access application and/or the OpenPGP Setup Wizard, then each one of you should send the other a test encrypted message just to make sure you have configured everything correctly (this is best done in person or over the phone, the latter of which either by landline, cellular, or VoIP).

Congratulations, you’ve successfully installed PGP; now you can send and receive encrypted email. If you’d like additional technical support with installing PGP as per this specific combination of software on a Mac OS, then feel free to send me an email (additionally, if you’d like to test whether you configured PGP correctly, also feel free to use my PGP Public Key, but remember, I’ll need yours first), preferably with the subject line “PGP Configuration Help.” If you would prefer some additional guidance with using GPG Keychain Access, I would suggest you watch the “GPG Encryption Software for Mac,” “GPGTools Screencast,” and “Adding GPG to Services/Encrypting/Decrypting on a Mac” video tutorials.

Rights, Ethics, and Property

I propose that voluntarists, ancaps, philosophers, and other liberty-minded individuals stop using the words “rights” and “property” entirely. These words are not inherently bad, but due to the accumulated baggage they’ve been saddled with and due to the fact that we now have more parsimonious alternatives, we can express our ideas with greater clarity by avoiding them.

Consider the difference between rights and the NAP. The NAP is an expression of proscribed behaviors (the initiation of force). From this proscription one can derive rights such as a the right to life, the right to bodily integrity, the right of free association, etc. There are two problems with talking about rights, however. The first is that due to frequent misinterpretation it’s essential to add a caveat to any definition of rights that specifies them to be negative instead of positive. Otherwise some people will start from the right to life as a premise, conclude that that everyone has a right to that which is necessary for life and eventually posit that all people are owed universal free internet access and health care. The other problem is that a specific enumeration of rights is wholly unnecessary. The single proscription, “do not initiate force”, covers everything that needs to be said about any right derived from the NAP. Occam’s razor suggests that we should choose the more parsimonious formulation and in practice this helps us communicate by avoiding the land mines of loaded terms with their associated emotional baggage and prior (mis)conceptions.

In order to entirely replace with rights with a succinct list of proscribed behaviors we need to address property, as the NAP alone is not sufficient. The definition of property is a tar pit that should be avoided at all costs, since arguments when fall into this area rarely achieve resolution. There’s just so much historical propaganda surrounding this term that I consider it to be a waste of time to even define, if it’s possible to avoid doing so.

The best I’ve been able to come up with so far is the following: It’s wrong to obtain resources via coercion or subterfuge. We already know that the direct application of violence to obtain resources is wrong based on the NAP. This statement adds the threat of violence and fraud to the list of proscriptions to, as far as I can tell, achieve a complete ethical description of property rights without ever needing to define property or refer to the concept of rights. The basic sanity check on this formulation is to see what it allows. If using or threatening violence, and fraud is forbidden what means of obtaining resources are allowed? Homesteading and voluntary exchange violate none of those proscriptions and they are what libertarian theories of property rights typically permit.

To go further towards the goal of increased clarity we need a succinct formulation of the NAP that’s short enough to explain to other people without exceeding their attention span. To that end I propose, “The only legitimate use of violence is for unavoidable self defense.” This is the most succinct, least subject to misinterpretation and hijacking formulation I can come up with. Combine this with the prior statement and we could say the following:

“Rational morality means: the only legitimate use of violence is for unavoidable self defense, and it’s wrong to obtain resources via coercion or subterfuge.”

My hope is this statement, or an improved version of it, can serve to help people avoid stumbling blocks in conversations by focusing on a short list of proscribed behaviors (ethics) instead of a long lists of enumerated rights and semantic tar pits. If anyone has suggestions, comments, improvements or can identify errors or omissions please let me know.

Blogosphere

Independent media has developed an ability to act as a watchdog against the government very well. From the humble roots of its newsletter, fax distribution networks, and talk radio days, the alternative media has flexed its muscle even more with the advent of the Internet. The proverbial “blog roll” is evidence of this, since they are regularly updated.

 

 

Blogs are the digital descendents of its paper-based progenitor, the newsletter. Readers subscribe to a periodical typically written by either a solitary individual or a miniscule cadre of less than a handful of writers. Both the newsletter and the blog have proven themselves time and again at overcoming compartmentalization, provided that the data given is factually verified and not just unsubstantiated rumour.

Former CIA officer Robert Steele has publicly addressed the imperative role bloggers play in political dissension:

 

“You are the Paul Reveres and Patrick Henries of our generation. Bottom up, horizontal connection is key. Sharing at all levels, not top down control. Public intelligence and influence is about to take off. We are about to BURY rule by secrecy. Civil affairs is the focal point. The intelligence guys need to go back in their box. Bloggers, not informants, are key. The FBI is about to try and hire 2,000 informants in a Soviet police state style approach to security; that’s idiocy.

“If you bloggers self-organize, and attach yourselves like leeches to specific issues, corporations, organizations, challenges, whatever, you will be the intelligence Minutemen of this century. The power is in your hands. There aren’t enough guns to kill us all, and Halliburton can’t build the jails fast enough to keep us down.

“Bloggers (as Linux as organized) where you grab onto an issue or something, and you are part of a structured citizen-journalism-blogging thing that lets no evildoing go unnoticed, that rules. So I think we’re at a turning point, I think we are at the very beginning of a historic tidal shift in power restoring the Constitution.”

 

What Steele is literally saying is that by exposing the misdeeds of government, the intelligence capabilities of the Establishment can be not only be countered but hampered as well (if done right). The blogosphere has the unprecedented capability in helping people see through the fog.

Since websites are taken down or discontinued, please keep in mind that the following links of websites I recommend visiting may not work at some point in the future. It is not uncommon for sites to simply change URLs; if that happens to be the case, just do a keyword search on your preferred search engine(s) using the name of the website. Remember too that the following list does not necessarily bear my seal of approval; the reason that I recommend you visit them is for the express purpose of demonstrating the variety of blogs available to you.

 

THE LAST BASTILLE’S LIST OF BLOGS TO VISIT

 

The Resistor

(An old newsletter that got some of its articles up on the Net; focuses on military & constitutional issues)

 

The Progressive Review

(While admittedly somewhat “hippie-ish,” it is nowhere as snobby as The Huffington Post)

 

WorldNetDaily

(I included this as an example of when conservative statists attempt to operate outside of the oligopolized media)

 

Reason

(Good mainline libertarian rag)

 

The Freeman

(Philosophically inclined libertarianism laced with free-market advocacy; much respected and older than the Mises Daily)

 

Free Republic

(User-based news aggregator)

 

The Nation

(The liberal statist version of WorldNetDaily)

 

Mother Jones

(Environmental version of The Nation)

 

Haight Ashbury Free Press

(Old publication from the newsletter & fax distribution days; you can pay them for their remaining print copies)

 

The Economic Collapse Blog

(Excellent blog that focuses exclusively on the slow-slide downward class migration; one of the handful I actually read regularly)

 

LewRockwell.com (LRC)

(Libertarian/propertarian anarchist news aggregator; one of the handful I actually read regularly, even before Ron Paul admitted he did so as well)

 

The Drudge Report

(Good news aggregator)

 

The Corbett Report

(Excellent watchdog-style “news & analysis;” what Alex Jones should have been)

 

The Wayne Madsen Report

(Truly good investigative reporter; his sources virtually never fail to check out)

 

SurvivalBlog

(James Wesley, Rawles‘ world famous survivalist blog; as a Rawlesian survivalist, I value self-reliance and personal preparedness as being fundamentally important)

 

Daily Anarchist

(Intriguingly good propertarian blog; they do have a bit of a hard-on for Bitcoin, so be forewarned)

 

Center for a Stateless Society (C4SS)

(Anarchist think-tank)

 

Spy Witness News

(Multi-contributer blog roll, usually from the constitutionalist perspective)

 

Russia Today (RT)

(Albeit, while not traditionally alternative media, they are very friendly with American political dissidents)

The Internet

Imagine, if you will, a decentralized network that is totally unregulated by the government. This very same infrastructure enables anyone to send and receive digital mail, browse multiple libraries worth of information, download data, exchange files, read regularly updated news, publish articles, participate in discussion forums, find other like-minded people, make voice calls, and watch uploaded videos, all for an affordable monthly access fee. The cumulative weight of this phenomenal invention weighs approximately 0.2 millionths of an ounce; it is none other than the Internet.

 

 

Digital information could be said to have been utilized the best in terms of securing our Liberties more than any other method currently available. It is the most effective way to circumvent the corporate oligopolistic mainstream media’s disinformation by hosting counter-propaganda and research materials. Pushing the alternative media into overdrive from the newsletter, talk radio, and fax days to blogs, podcasts, and especially streaming videos has enabled user generated content to essentially sell the message of Liberty, thus resulting in the very first American Renaissance.

Some would argue that the Internet is an instrument of tyranny that is designed to distract, monitor, and fundamentally prevent even the most dedicated dissidents from acting more effectively against the Establishment. While it is true that the Carnival of Distractions has overtaken our alternative media (thanks to both controlled opposition and the useful idiots who spew unsubstantiated rumor), there are disciplined investigative journalists and others whose original work is given a stable platform from which to spread virally. There is documented surveillance of the Web (especially via traffic analysis), but the invisible hand of the market has already provided many different tools with which to at least partially thwart the eyes of both private and public criminals. In terms of laziness or seemingly a lack of dedication, it is the responsibility of the individual as to what he is willing to do or not do; there is no need to wait or otherwise delay in acting until the Internet is either forcibly transitioned to an overly regulated “Internet 2” or an arbitrary Internet shutdown courtesy of the White House’s “kill switch.”

I think it is premature to write the Internet off. Though it is true that certain individuals and organizations can become overly dependent (or even addicted) to the Internet, as long as you understand the costs relative to the benefits, I think the Internet can be used in a variety of ways where it accentuates the overall capability to push the cause for Liberty forward (if you don’t believe me, just look at the 2008 and 2012 Ron Paul presidential campaigns; imagine if all that expertise was instead expended on Committees of Safety). As a videographer, I can personally attest that anyone believing in the claims of a documentary “because YouTube said so” is a cop-out, since everyone across the board is encouraged to fact-check everything asserted in an open-source film. Similarly, networking with like-minded individuals does not mean that forum discussion boards, email, or even VoIP calls are a confessional; INFOSEC is to be practiced at all times as a matter of habit, saving any pertinent details for face-to-face meetings.

The Internet is an invaluable tool if you know how to use it, which takes practice and experience. Never tolerate internal balkanization online and try to avoid getting sucked into any of it, if at all possible. Experience the Wild West attributes as much as possible, squeezing every bit of advantage that you can from it, and enjoy the laizze-faire atmosphere (if you are offended by something, nothing is preventing you from surfing somewhere else).

Since websites are taken down or discontinued, please keep in mind that the following links of websites I recommend visiting may not work at some point in the future. It is not uncommon for sites to simply change URLs; if that happens to be the case, just do a keyword search on your preferred search engine(s) using the name of the website. Remember too that the following list does not necessarily bear my seal of approval; the reason that I recommend you visit them is for the express purpose of understanding the vastness and true diversity that the Internet unequivocally provides for all of us.

 

THE LAST BASTILLE’S LIST OF INTERNET WEBSITES TO VISIT

 

The Internet Society

(These guys are all about not only keeping the Net open, but also expanding stable access into those areas where connections are either spotty and non-existent)

 

Living Internet

(The best history of the Net that I found on the Net)

 

Coalition of American Patriots (CAP)

(The Last Bastille Blog is a founding member, and I am a delegate to the Administrative Board of the Coalition; essentially, CAP is an anti-internal balkanization organization)

 

JB Campbell: Extremism Online

(JB Campbell claims to have started the militia movement when he published The New American Man: A Call to Arms. Listen to the interview he did when he was on January 12th, 2012 broadcast of Short End of the Stick with Mike Harris)

 

Agorism

(These are the anarcho-capitalists who seek to starve the State by practicing counter-economics; that is, the practice of trading in the black and grey markets)

 

Spy & CounterSpy

(Good advice for how to perform counter-surveillance and otherwise protect your privacy offline)

 

Seeing Through the Fog

(Used to be a BlogTalkRadio series with Brad Moore and Randy Mack; better term than “waking up” and I have since adopted it to more accurately describe the same phenomena without all the false holier-than-thou pretensions)

 

Vin Suprynowicz

(Libertarian writer; intriguing food for thought)

 

The Constitution Society

(Jon Roland’s site; some interesting stuff here, even if it’s not all accurate)

 

You Have Tread on Me

(The best live stream Internet radio/podcast on the Net, in my not so humble opinion. Home of the Under One Banner petition, as well as the folks who were so kind as to host episodes #47 – 52 of The Last Bastille Podcast)

 

Outpost of Freedom [Blog]

(The best blog and archived research about the Patriot Community from the 1990s to its resurgence, in my not so humble opinion; also home to the You Have Tread on Me – Under One Banner petition)

 

Campaign for Liberty

(While I have made it adamantly clear how I do not support Ron Paul’s presidential various candidacies, I do support the work of C4L, which has done a lot to help people see through the fog of statism)

 

Institute for Justice [IJ]

(These fellas actually sue the government for its various forms of malfeasance. Their legal cases and concomitant research reports about civil asset forfeiture deserve your particular attention)

 

Electronic Frontier Foundation [EFF]

(These guys are like the IJ equivalent in terms of digital privacy. They are a contemporary of EPIC)

 

Electronic Privacy Information Center [EPIC]

(A Big Brother watchdog organization. Be sure to visit their Privacy Tools page to see how to start reclaiming your digital privacy back)

 

Cypherpunk

(Unfortunately, their original website went down awhile ago, but this is Wikipedia page that contains some documents and links)

 

Federal Bureau of Investigation (FBI)

(If you want to see just exactly how people are demonized, see the Ten Most Wanted. Keep in mind while you’re using the site that they do record IP addys, since they are the secret police)

 

Southern Poverty Law Center (SPLC)

(These are the jerks who constantly demonize anyone who cares about their Liberties)

 

Jeff Chan’s RKBA

(Some stuff about guns, and other such things)

 

The Lycaeum Forums

(Some stuff about the physiological effects of particular kinds of vegetation, and other such things)

 

International Society for Individual Liberty (ISIL)

(Pamphleteers extraordinaire! Read over 50 of their pamphlets online)

 

Youkali (Utopian Island Paradise)

(Just one example of a libertarian fantasy world)

 

The Hodge-Podge Transformer

(Discordian portal)

 

Advocates for Self-Government

(These are the fellas who push the World’s Smallest Political Quiz. For even better quizzes, visit my Quizzes page)

 

Newgrounds

(The best flash portal on the Net! The selection of flash cartoons and interactive games easily surpasses that of every other similar website)

 

Free State Project

(As much as I admire the spirit and pluckiness of Free Staters, I must admit that their self-admitted numbers of getting only slight above 1,000 people to New Hampshire when the target goal was 20,000 falls dramatically short. I think that JWR’s American Redoubt is the improvement upon the failures of the FSP)

 

Sons of Liberty: Brush-Fires of the Mind

(Jon Schaeffer’s site. Good hard rock/metal as an alternative to the Truther rap music so common in the Internet media)

 

Delta Press

(Their catalog is better than Borders Books )

 

Eden Press

(Their catalog is better than Half-Price Books)

 

Paladin Press

(Their catalog is better than Barnes & Noble)

 

Loompanics

(Their catalog used to be better than Delta, Eden, and Paladin Presses combined, but they’ve had some trouble in recent years. They’re still worth your time to browse)

 

Committees of Safety

(The number #1 site on the Net that explains this pivotal concept, which is integral to the effort to secure our Liberties. More and more in the Patriot Community are being taught about this neglected aspect of American history, as well as how to implement them today)

 

9/11 Essentials

(Intriguing aggregator of a bunch of shit from across the blogosphere. I was able to find a lot of the other things on this list through this site)

 

SongU

(If you are musically inclined, this website might help you self-educate into a profitable one)

 

Literotica [*Adults-only]

(The only really good site for erotica on the Net)

 

Tiny Nibbles [*Adults-only]

(Violet Blue’s blog. Her sex-positive tone is libertarian and very much appreciated, although I wonder how aware she is of the government’s eugenics policies)

 

Sex In Christ [*Adults-only]

(Is it real, or is it a parody? I have no idea, but it is thought-provoking at the very least that some Christians would sanction and even encourage menage a trois, masturbation, and butt sex)

 

Internet Archive

(A great repository of data, bar none)

 

Scribd

(Another good repository of data; bookmark it)

 

Modern Drunkard Magazine

(Hilarious content that is all about drinking)

 

Special Operations Humour

(Military comedy that I haven’t seen anywhere else)

 

Never Get Busted!

(Barry Cooper’s site. Former cop turned avid pothead teaches people law enforcement’s tricks of the trade)

 

Law Enforcement Against Prohibition

(Cops who want to repeal drug prohibition; a good cause if I’ve ever seen one)

 

Conspiracy Cards

(Wonderful Canadian fellow. Either buy his cards or make your own)

 

Republic of the united States of America

(These guys made it onto the SPLC hit lists, but there have been others in the Patriot Community that claim these guys don’t know what they are doing; you figure it out for yourself)

 

National Center for Constitutional Studies

(NCCS publishes some good books on the Founders, but a portion of the content mimics some Christian Identity bullshit)

 

Pokerface

(Absolutely fantastic Patriot rock band who predate Jon Schaeffer. These guys were active in the ’90s and still recording albums currently. I even made a fan tribute music video of their song, “Rather Die Than Be Your Slave” that Paul gave me his blessing on)

 

God Rewards the Fearless

(Patriot web-series about the Resistance after the economic collapse)

 

4chan

(Home of Anonymous)

 

Ben Lowery

(Freeman-on-the-Land Brit turned voluntaryist)

 

Larken Rose

(Libertarian who has been constantly harassed by the IRS; this is also the same guy who wrote “When Should You Shoot a Cop“)

 

Free Talk Live

(Libertarian radio network up in New Hampshire as part of the FSP)

 

Evil Bible

(Great site that documents the atrocities that this particularly “holy book” sanctions and even encourages; you’ll never see “sacred Scripture” the same way again!)

 

Modern Deism

(After you’ve ditched your Bible, this a starting point with how to rethink the way you think about God)

 

Positive Deism

(Wanna be like the Founders? Maybe you should study Deism)

 

World Union of Deists

(Demonstrates you don’t need no stinkin’ clergy to tell you how to relate to God)

 

God is Imaginary

(For Deists and others who want to explore Atheism)

 

Hanna Werdmuller

(Folk musician; listen particularly to the “Pre-Apocalytpic Love Song”)

 

Lysander Spooner 

(Constitutionalist lawyer turned anarchist)

 

Voltairine de Cleyre

(Verbose writings of an anarchist-without-adjectives)

 

Anarchism.net

(Probably the best starting point for learning about anarchism; be sure to take a look at their symbols)

 

The Voluntaryist

(Many articles from the individualist anarchism school)

 

The Molinari Institute

(Think-tank that promotes market anarchy)

 

Alliance of the Libertarian Left

(Conglomeration of anarcho-capitalist and agorist organizations)

 

Voluntary Society

(Great website on voluntaryism as well as some good suggestions on methodology)

 

V for Voluntary

(Another good website on propertarian anarchism; home of the V for Voluntary shield)

 

Voluntaria

(More of a portal to the other propertarian sites)

 

Ludwig von Mises Institute

(Home of the Austrian school of economics; the founder of the Mises Institute, Lew Rockwell, is an openly admitted anarcho-capitalist. When Philo thought that the Mises Institute was controlled opposition on episode #40 of The Last Bastille Podcast, this is the organization to whom he was referring)

 

Econ Stories

(These were the fellas that had the wonderful rap battles between “Keynes” and “Hayek”)

 

Foundation for Economic Education

(These guys usually push Mises literature; they also publish The Freeman)

 

Learn Liberty

(Fascinating site that is intended to be a crash course that combines video instruction with interactive quizzes)

 

Are You Libertarian?

(Collection of political orientation quizzes)

 

Libertarianism

(Best brief explanation of libertarianism to date)

 

Ayn Rand Institute

(Objectivist cadre)

 

The Atlas Society

(Another Objectivist cadre; I will admit it is sad to see the neo-Objectivists acting just like neo-cons when they supported the imperialistic wars of aggression against Afghanistan and Iraq)

 

Despair, Inc.

(Humorously negative insights)

 

Anarchy in Your Head

(My favorite webcomic, by far. Be sure to look at the “Top Ten Causes of Minarchism” series)

 

Liberty Activism Repository

(Download everything thing from liberty-themed books, audiobooks, journals, pamphlets, flyers, and more!)

 

Sinfest

(Another good webcomic, albeit more of a religiously themed one)

 

Don’t Track Us

(Another good basic starting point for people to see the options they have for digital privacy)

 

How to Vanish

(Decent site for the very basics of both online and offline privacy)

 

Free Software Foundation

(These are the guys who push for open-source freeware; they are just as integral to the cause for the Liberty as the Internet itself is)

 

Creative Commons 

(Uniquely innovate compromise with US copyright statutes. If you’ve ever noticed, those who are anti-copyright use Creative Commons “licenses” on their websites, such as the Liberty Activism Repository, Hackbloc, and of course, The Last Bastille Blog)

 

Hackbloc

(Crypto-anarchy freeware hacktivists; check out their Resources and Tools page)

 

Hack This Site!

(The king of all hacktivist sites; they even train “normal” activists in socially responsible hacking!)

 

Startpage

(Great privacy friendly search engine; Dr. Katherine Albrecht is their media contact)

 

DuckDuckGo

(My favorite search engine; the founder has written for The Daily Anarchist)

 

The Ruckus Society

(Activists who publish great manuals on direct action)

 

Invisible Molotov

(Anarcho-capitalist blog that archives old anarchist pamphlets and booklets)

 

Snopes

(The proverbial rumour mill; part of me thinks this is the primary source for most of the bullshit that the Patriot Rockstars come up with)

 

Operation Sleeping Giant

(A project by the Oathkeepers; more aggressive than simply refusing to follow unlawful orders, but it is no Plan for the Restoration of Constitutional Government)

 

Foundation for a Free Society

(Agorist site; complimentary to Agorist.info)

 

Zine Library

(Archived anarchist matertials)

 

Cato Institute

(Libertarian think-tank)

 

Even Hand: A Contract for Government

(Unique minarchist idea about improving the federal Constitution post-victory according to Aristotelian principles)

 

Texans for Accountable Government

(TAG is a local Austin, TX watchdog group that is both constitutionalist and agorist friendly)

 

Spunk Library

(Another anarchist online depository)

 

Association of Libertarian Feminists

(Unique feminist organization that is simultaneously anti-statist)

 

The Zeitgeist Movement

(I included TZM more as an object lesson of what the Internet can enable and yet what should NOT be done)

 

The Venus Project

(Just like TZM, TVP’s designs of futuristic flying donut cities is nothing really more than Marxism with robots)

 

Anarchopedia

(Yet again another location of anarchist literature)

How to Use Freenet for Social Networking (Mac version)

Update 13 September 2012:  This post will no longer be updated. Complete and up-to-date instructions can be found at: http://go.to.freenet

 

Freenet is one of the most powerful yet least known tools for anyone who is interested in secure Internet communications. The purpose of the Freenet Project is described on their official website as follows:

Freenet is free software which lets you anonymously share files, browse and publish “freesites” (web sites accessible only through Freenet) and chat on forums, without fear of censorship. Freenet is decentralised to make it less vulnerable to attack, and if used in “darknet” mode, where users only connect to their friends, is very difficult to detect.
Communications by Freenet nodes are encrypted and are routed through other nodes to make it extremely difficult to determine who is requesting the information and what its content is.

For those who truly value privacy, anonymity, and free speech, Freenet is a viable replacement for typical social networking websites such as Facebook or Google+. Anyone who genuinely cares about their ability to publish easily, securely, and anonymously (if desired) should add Freenet to their cyber repertoire.

The following tutorial is the first segment of a six part guide that details how to set up secure communications over Freenet, including email, discussion forums, microblogging, and (nearly) instant messaging. At the end of this first segment, you will be able to access Freenet yourself and then follow the other five sections.

These instructions are for the Mac OSX operating system. If you use the Windows operating system, please refer to this other set of instructions.

The Freenet Social Networking Guide

Part 1a: Freenet Installation

Before you get started make sure you have a reliable browser and mail client installed. This guide will use Firefox and Thunderbird.

  1. Download and run the Freenet Installer.Step 2
  2. If you don’t already have Java installed you’ll be prompted to do that first.Step 2
  3. Now you’re done with Java.Step 3
  4. Enable Web Start to launch the Freenet installer.Step 4
  5. Click ‘Allow’ here.Step 5
  6. Choose the language you’d like to use.Step 6
  7. The next remaining screens do not require any interaction other than clicking ‘Next’ unless you want to change the installation directory.Step 7Step 8Step 9Step 9Step 9Step 9Step 9

Part 1b: Freenet Configuration

  1. You should now see the setup wizard. Click ‘Choose custom security’.Step 1
  2. You should always browse Freenet in Private Browsing or Incognito modes. If you aren’t already do so now. Remember to copy the URL and paste it back into the address bar.Step 2
  3. Click ‘Next’.Step 3
  4. Enable automatic updates and UPnP and click ‘Next’.Step 4
  5. Choose the second option here. If you know other people who use Freenet you can upgrade to darknet mode in the future but for now you need to connect to strangers in order to access the network.Step 5
  6. Choose “NORMAL” here.Step 6
  7. Choose “LOW” here. The higher levels of security unfortunately do not fully protect your identity if you use the kinds of social networking plugins we will be installing. You should use a whole disk encryption product like Truecryptor FileVault, but setting that up is outside the scope of this guide.Step 7
  8. The installer will pick a default value based on the size of your hard drive.Step 8
  9. You have two options to choose from here. If you want to limit bandwidth based on a monthly cap click ‘Yes’. Otherwise click ‘No’ and skip to step 11.Step 9
  10. ‘Select’ your monthly data cap from the options provided or type a value into the last box. Skip to step 12.Step 10
  11. Select the right bandwidth limit based on your connection type in your own values.Step 11
  12. Before installing any of the social networking plugins in future steps you should increase the maximum amount of memory your node is allowed to use. Go to the ‘Core settings’ page under the Configuration menu.Step 12
  13. The first option in this menu should be ‘Maximum memory usage’. Change this value to 512.Step 13
  14. Scroll down to the bottom of the page and click ‘Apply’.Step 14
  15. Before the change takes effect you must restart the node. Return to the Freenet homepage to do this.Step 15
  16. At the bottom of the page there is a button you can use to restart your node.Step 16
  17. Confirm that you want to restart and wait for the page to automatically refresh and load the home page.Step 17

Congratulations, you’ve successfully installed Freenet. Now you can set up secure, anonymous social networking accounts by continuing with Part 2 of this guide. (the link to Part 2 will not open until you have successfully installed Freenet)

How to Use Freenet for Social Networking

Update 13 September 2012:  This post will no longer be updated. Complete and up-to-date instructions can be found at: http://go.to.freenet

 

Freenet is one of the most powerful yet least known tools for anyone who is interested in secure Internet communications. The purpose of the Freenet Project is described on their official website as follows:

 

Freenet is free software which lets you anonymously share files, browse and publish “freesites” (web sites accessible only through Freenet) and chat on forums, without fear of censorship. Freenet is decentralised to make it less vulnerable to attack, and if used in “darknet” mode, where users only connect to their friends, is very difficult to detect.Communications by Freenet nodes are encrypted and are routed through other nodes to make it extremely difficult to determine who is requesting the information and what its content is.

For those who truly value privacy, anonymity, and free speech, Freenet is a viable replacement for typical social networking websites such as Facebook or Google+. Anyone who genuinely cares about their ability to publish easily, securely, and anonymously (if desired) should add Freenet to their cyber repertoire.

The following tutorial is the first segment of a six part guide that details how to set up secure communications over Freenet, including email, discussion forums, microblogging, and (nearly) instant messaging. At the end of this first segment, you will be able to access Freenet yourself and then follow the other five sections.

These instructions are for the Windows operating system. If you use the Mac OSX operating system, please refer to this other set of instructions.

The Freenet Social Networking Guide

Part 1a: Freenet Installation

Before you get started make sure you have a reliable browser and mail client installed. This guide will use Firefox and Thunderbird.

  1. Download and run the Freenet Installer for your operating system.The first thing the installer will do is check for an updated version of Java. If necessary, update Java now or if you already have a new enough version you can skip to step 4.
    Note: If you are running a 64 bit version of Windows with only a 64 bit version of Java you must go to java.com and install a 32 bit JVM as well. The installer will not detect a 64-bit only Java installation.
    Step 2
  2. The default directory is fine.
    Step 2
  3. Now you’re done with Java.
    Step 3
  4. Select the first three options under Additional settings and click ‘Install’.
    Step 4
  5. Click ‘OK’ to close the installer.
    Step 5
  6. Before we go any further let’s increase the maximum amount of RAM the node is allowed to use to make sure we have enough to run the social networking plugins.Right-click on the Freenet icon in the system tray and click ‘Exit’.
    Step 6
  7. The file you need to edit is stored under your profile in a location that depends on your user name. You may need to tell Windows to stop hiding system file in order for you to access the Application Data folder. Open wrapper.conf in a text editor.
    Step 7
  8. The last line of the file specifies the amount of RAM that Freenet is allowed to use. Change this value to 512 and save the file.
    Step 8
  9. Start Freenet from the desktop icon.
    Step 9

Part 1b: Freenet Configuration

  1. You should now see the setup wizard. Click ‘Choose custom security’.
    Step 1
  2. You should always browse Freenet in Private Browsing or Incognito modes. If you aren’t already do so now. Remember to copy the URL and paste it back into the address bar.
    Step 2
  3. Click ‘Next’.
    Step 3
  4. Enable automatic updates and UPnP and click ‘Next’.
    Step 4
  5. Choose the second option here. If you know other people who use Freenet you can upgrade to darknet mode in the future but for now you need to connect to strangers in order to access the network.
    Step 5
  6. Choose “NORMAL” here.
    Step 6
  7. Choose “LOW” here. The higher levels of security unfortunately do not fully protect your identity if you use the kinds of social networking plugins we will be installing. You should use a whole disk encryption product like Truecrypt, but setting that up is outside the scope of this guide.
    Step 7
  8. The default value is fine.
    Step 8
  9. You have two options to choose from here. If you want to limit bandwidth based on a monthly cap click ‘Yes’. Otherwise click ‘No’ and skip to step 11.
    Step 9
  10. ‘Select’ your monthly data cap from the options provided or type a value into the last box. Skip to step 12.
    Step 10
  11. Select the right bandwidth limit based on your connection type in your own values.
    Step 11
  12. You are done setting up your node. At this point you may want to wait a short time before contining to the next step in order to let your node become fully connected to the network. Make sure your computer doesn’t go into sleep or hibernation while Freenet is trying to connect to the network.
    Step 12

Congratulations, you’ve successfully installed Freenet. Now you can set up secure, anonymous social networking accounts by continuing with Part 2 of this guide. (the link to Part 2 will not open until you have successfully installed Freenet)