Posted on 11/20/2020 12:51:06 PM PST by Sense
White House: Executive Order on Preventing Online Censorship
https://www.whitehouse.gov/presidential-actions/executive-order-preventing-online-censorship/
Washington Post: Trump signs order that could punish social media companies for how they police content, drawing criticism and doubts of legality
https://www.washingtonpost.com/technology/2020/05/28/trump-social-media-executive-order/
Microsoft: A Twenty-First Century Framework for Digital Privacy
https://constitutioncenter.org/digital-privacy/secret-searches-and-digital-civil-liberties
Glenn Greenwald: How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations
https://theintercept.com/2014/02/24/jtrig-manipulation/
Please add what you can.
I'd like to generate enough information to enable filing a class action lawsuit that does not depend on any "official" support.
Section 230 does not apply liability limits to companies that are interfering with communications at this level.
How often have you been experiencing connectivity issues to this exact address?
It’s likely your ISP.
The backbone does not filter for anything.
Or somebody injected code onto your PC.
30yrs Network engineering, security and project management.
Use these OpenDNS IP adresses for DNS in you network connection properties: 208.67.222.222 and 208.67.220.220
Have additional reason to suspect that the issue is both imposition of an ISP level interference...
and Linux hacking of repository management that enables direct intrusion into systems control... ie, external agents trespassing on local systems to impose altered kernel level external access and more...
Problem with that exact address... today.
Before FR went down with the address change... I was able to access all of the site... but was prevented from posting myself... saying it didn’t recognize me... wouldn’t allow me to sign in... but, obviously a filter somewhere preventing the comms.
Well, that’s fun... Someone spoofing ?
That link returns... https://45.79.56.181/tag/*/index
Warning: Potential Security Risk Ahead
Firefox detected a potential security threat and did not continue to 45.79.56.181. If you visit this site, attackers could try to steal information like your passwords, emails, or credit card details.
What can you do about it?
The issue is most likely with the website, and there is nothing you can do to resolve it. You can notify the website’s administrator about the problem.
Old version of windows?
malware
An IP address won’t work since it’s not (or extremely unlikely) listed in the certificate.
>> An IP address won’t work ...
peacefully without warnings
This is one of the same problems I had the other day with logging in. The link going to 45.79.56.181 and the FR login screen refusing to budge.
I checked FR’s DNS and it is resolving fine and is not listed under any known blacklists. You can use the ip address 45.79.56.181, however it will result in cert errors since a ssl cert cannot be issued to an ip address; fqdns only.
First try this from a command window:
ipconfig /flushdns
If the problem persists, power down your router, wait 30 seconds, then power on.
I am thinking he criticized our betters and they are blocking him.... the future for us all!
Website Name:
www.freerepublic.comURL Checked:
no responseResponse Time:
~2 days 2 hoursDown For:
DOWN
Freerepublic.com is DOWN for everyone.
It is not just you. The server is not responding...
Its not down for me and many others. I suspect it his isp that is blocking that traffic. I’m on a mobile and its working great.
I’m being blocked from basic whois function...
Can you check if for 45.79.56.181 ?
Curious that FR is down... yet, here we are, posting ?
A more interesting artifact is that the round trip from the link somehow altered the Ubuntu preferred repository for updates from a US main source to:
aze.archive.ubuntu.com
Azerbaijan. Really ? No, I did not select getting my software updates from Azerbiajan...
I see there’s an Ubuntu update out now, addressing, and one assumes, attempting to fix the backdoor or the hack that enables spoofing the repository (and thus kernel) access.
Bookmark
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.