Posted on 06/22/2009 3:55:46 PM PDT by fightin bronco
Neda Soltanis Death Inspires New Site
A hastily created Web site called NedaNet has formed in honor of a young woman, Neda Soltani, who was killed during a Tehran protest.
The sites founder, Eric S. Raymond, created the page to serve as a jumping-off point for hackers who want to help Iranian citizens. Our mission is to help the Iranian people by setting up networks of proxy servers, anonymizers and any other appropriate technologies that can enable them to communicate and organize a network beyond the censorship or control of the Iranian regime, the site says.
A video widely circulated online shows a young woman, Neda Soltani, who was reportedly killed during a protest in Tehran, Iran. Irans censors have spurred protesters and activists to circumvent the system in any way they can. Mr. Raymond solicits bandwidth and computing power that will enable citizens on the ground to rapidly disseminate information and thus puncture the countrys firewall.
He acknowledges the danger that hacking into the network entails. Hes also received death threats and intimidating messages from purported Hezbollah and Iranian agents. Still, he ends his online plea with the sentence: For any jihadi interested in asking me questions face to face, Ive got some bullets slathered in pork fat to make you feel extra special welcome.
(Excerpt) Read more at blogs.wsj.com ...
I’ve had a twitter proxy up and running for several days now on my network, so far it’s gone undetected and unblocked by the Iranian Government and is still passing messages .....
I am unfamiliar with The Onion Router (TOR), but keep in mind that just because you encript the message successfully does not mean that the transmission is not detected. The mear fact that it is encripted is a flag that it should be monitored and examined.
If it is a transmission of pics or video, I am not sure how you would handle that. I am sure there is a way.
If it is being handled by RF networks, spread spectrum offers a lot of security. Whichever method of frequency hopping you choose. I doubt the average computer user can apply that, but governments do. Short burst on frequency hopping trasmitters and receivers are a good step to RF security. Problem with RF is bandwidth, fiber gives a lot higher data rate and for that reason is almost universally used where available.
I had no knowledge of the Tor router technology prior to reading this article. Interesting to say the least.
Well, I have an anonymous Twitter Server running at home that’s passing thousands of messages an hour out of Iran, a FreeGate Server and I donate bandwidth to TOR. My high speed internet connection is 50mb down, 22mb up. Roughly half my bandwidth is taken up by Twitter and Tor at the moment.
By the way, my Twitter server has been up more than a week now. TOR I’ve donated half my bandwidth to encrypted, secure, network browsing for more than a year now. EGate went up Thursday evening, haven’t seen any traffic across it yet.
I've spent a considerable amount of time in the last week helping others setup Twitter Servers for Iran, it's a huge growing movement.
Here's My Twitter Page which I offered help on, and received a dozen or more requests for help in the last week.
If you have the knowledge and some time to spare, helping to support freedom and democracy in Iran is a very worthwhile cause...
Thanks for helping them. The more sources that are sending the less likely that they will nail someone from the volume of ip traffic. If some of it is simply music downloads or uploads it will mask the real important data.
If I were trying to locate someone that was a threat, I would look at the high traffic ip addresses first. I am sure they have records of physical locations of ip addresses.
You can also put text messages inside images. These can be extracted on the other end by opening it with an editor. If that data is first encripted, then that is another level of security.
Of course none of this will help if video’s or pics are what you are sending. I am sure there is a way to encrypt it, but I do not know how.
Pray for the brave Persian soles who are doing this.
I just remote controlled my machine from the summer house in the upper penninsula of michigan and so far everything's still running fine.
Thanks again.
Networking is not my strong suite, but I have a working knowledge of it.
We may have an advantage in that most techies are not taken in by the Mullahs. And of course those focused on 700 AD have no interest in things technical, except when they must. And then they rely on others to furnish the help.
Keep up the good work.
If you get thru the multiple links ....we see that the bush administration did some work that is helping now....I don’t want to say more than that....
You could say...Bush did it!
Note of encouragement....see this related thread:
Battle for Iran Shifts from Streets to the Heart of Power
Earlier related thread that implied this would happen:
Also...a related thread:
Thanks for links-
“#________RT from Iran: Basij are marking doors to attack later. Use oil/petrol to remove marks. Pls RT”
—
It is neat to here some useful stuff filter through the noise of the typical youth traffic. I’ll bet it drives those old duffers trying to follow it crazy. (The Mullahs are already certifiable)
Thanks for links-
“#________RT from Iran: Basij are marking doors to attack later. Use oil/petrol to remove marks. Pls RT”
—
It is neat to here some useful stuff filter through the noise of the typical youth traffic. I’ll bet it drives those old duffers trying to follow it crazy. (The Mullahs are already certifiable)
Was trying to understand how Twitter functions tonight and read something I think is bogus on Wiki.
http://en.wikipedia.org/wiki/Twitter
“The first criminal prosecution arising from Twitter posts began in April 2009 in Oklahoma City, Oklahoma. Agents of the Federal Bureau of Investigation arrested Daniel Knight Hayden, a supporter of the Tea Party protests against the policies of President Barack Obama. Hayden was allegedly sending tweets threatening violence in connection with his plan to attend the Tea Party protest in Oklahoma City.”
—
They do not miss a beat to try and villianize “The Tea Parties”. He said things that were just stupid, but I did not see a direct threat to Obozo or any other political figure.
RT from Iran: Basij are marking doors to attack later. Use oil/petrol to remove marks. Pls RT ......................... LOL. better to send “petrol and soap flakes” make better Molotov cocktails. Its also time to send all those IEDs we captured in Iraq and Afghanistan back to Iran.
Aso! So you don’t think big Al Snore will get pissed off and claim ownership of the technology./sarc off.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.