中国骇客云平台官网首页更新通告!

尊敬的用户大家好!

本平台官网首页更新了两个客服功能,客服机器人800客服自助回复功能可以在弹窗点击它了解更多有关平台问题的解答!

另外首页内嵌入了chat聊天室,直接登录即可联入中国骇客云平台官网的技术客服,回复可能比较慢,在您注册账户登录中保持登录状态,我们的客服会给您回复您所需要的问题!

官网客服可以直接点击页内聊天室左侧AnonymousHacker直接预留信息即可!

也可以关注我们官网公众微信二维码!国区微信授权客服号,可以查看弹窗或者公众微信查看更多客服详情!感谢支持!

中国骇客云平台官网产品有需要请联系我们的广告客服!

短信轰炸延迟 云胡渣!

棋牌透视辅助!!

短信轰炸

中国骇客云平台官网因部分的国内业务调整有需求请联系下我们的客服!!!感谢大家的支持噢 ~~~~
更多软件后续视频发..因为有些不能平台发..请大家添加客服即可!感谢老客户以及大家一致以来的支持!
平台官网:www.anonymouoschina.org  www.anonymouschina.com www.hackerschina.org

微信定位刷粉

查kf

手机即使监控  间谍程序

呼死你轰炸接听..麻仁

定位装B神奇

 

资金转账无功能有显示装B神奇

胡思你轰炸!!!!
更多软件:手机改号   菠菜开奖平台  菠菜开奖劫持开奖号篡改等!

中国骇客云授权通知公告,以及近期国内团队业务调整如下说明。

2018年7月16日至7月17日网站临时维护。

所有授权会员会在今晚统一授权。

如果还没有授权的会员请扫描二维码添加一下客服。

感谢大家的支持。

另外本平台国内团队开始以下业务,可加客服询问更多详细信息。

苹果🍎安卓🍎电脑

🏃微信、QQ——:红包双号扫尾、红包群流水机器人、埋雷挂、棋牌软件、不封号秒抢、转包软件、异常群

😘微商——:爆粉神器、一键转发、人脉大师

🎉闲聊、陌陌、支付宝——:直播秒、红包秒、单号透视扫尾中间抢

🌹直播平台——:快手、抖音、火山刷粉丝、刷关注、刷爱心、刷流量

😱电脑平台——:网站建设服务器、虚拟主机托管、域名抢注、公众号微信小程序制作、龙虎时时彩合作

😱暴力项目:数据交易、金融数据、报告身份证、手机号用户名注册会员!价值几十万人民币!有的直接私聊我!棋牌辅助外G出售!包安装使用!

👊其他——:私人棋牌平台制作、电话短信轰炸机、影视会员、中国色。直播平台、开f记录、三网定位、支付宝13星、绑定对方手机实时监控(短信、电话、位置、环境)

💪有意者请私我中国骇客云平台招募菠菜代理服务,分为免费代理和黄金代理两种。想挣钱的私聊我,看到会回复,非诚勿扰,目前本平台免费代理纯收入为6800+,黄金代理纯收入为10000+每月!

有想做的朋友请私聊!

另外招募中介,中介人员每介绍一位菠菜爱好者并下注可得下注的百分之10的佣金!

有意者请私聊我。

官网www.anonymouschina.org

www.anonymouschina.com

国际访问

www.hackerschina.org

在线万部大片永久看请私聊我!

acfun数据泄漏千万,中国骇客云平台提示您注意自己的密码安全,赶紧修改密码!

6月13日消息,今日视频弹幕网站AcFun发布公告称,AcFun受黑客攻击,近千万条用户数据外泄,建议用户尽快修改密码,目前已经搜集了相关证据并报警处理。目前本平台,第三方国外应用只可查询部份的信息。信息收集为第三方!国外网站。

以下是公告全文:更多关注中国骇客云,匿名中国官网

尊敬的AcFun用户:

我们非常抱歉,AcFun受黑客攻击,近千万条用户数据外泄。

如果您在2017年7月7日之后一直未登录过AcFun,密码加密强度不是最高级别,账号存在一定的安全风险,恳请尽快修改密码。如果您在其他网站使用同一密码,也请及时修改。

AcFun在2017年7月7日升级改造了用户账号系统,如果您在此之后有过登录行为,账户会自动升级使用强加密算法策略,密码是安全的。但是如果您的密码过于简单,也建议修改密码。

这次重大事故,根本原因还在于我们没有把AcFun做得足够安全。为此,我们要诚恳地向您道歉。

接下来,我们会采取一切必要的措施,保障用户的数据安全。我们的措施包括但不限于:

1、强烈建议账号安全存在隐患的用户尽快修改密码。我们会通过AcFun站内公告、微博、微信、短信、QQ群、贴吧等途径提醒这部分用户,也请大家相互转告。对于未及时主动修改密码的存在隐患的账户,将会在重新登录访问时,被要求修改密码。

2、事发之后,我们第一时间联合内部和外部的技术专家成立了安全专项组,排查问题并升级了系统安全等级。

3、接下来,我们会对AcFun服务做全面系统加固,实现技术架构和安全体系的升级。

4、我们已经搜集了相关证据并报警。

后续,我们会与用户、媒体和各界保持信息的及时沟通。

最后,我们再次向您诚恳地道歉。未来我们要用实际行动把A站的安全能力建设好,真正让用户放心。

AcFun弹幕视频网

2018年6月13日

用户特别提示

1、泄露的用户数据包括哪些?

包含用户ID、用户昵称、加密存储的密码等信息。

2、用户被泄露的密码是明文密码还是经过加密的?

AcFun的所有用户密码都经过加密,没有明文密码。

3、2017年7月7日之后登录过AcFun的用户,需要修改密码吗?

这部分用户的密码自动升级为更强的加密策略,密码是安全的。但是如果您的密码过于简单,也建议修改密码。

4、2017年7月7日之后没有登录过AcFun的用户,该怎么办?

建议用户尽快修改密码,如果用户在其他网站使用同一密码,也请及时修改。AcFun会采取技术措施,这部分用户的账户在重新登录访问时,会被要求修改密码。

如果您有进一步的问题,请发送至report@acfun.cn反馈。对于给您带来的困扰和不便,再次抱歉!

中国骇客云平台国际聊天室最新公告说明。

drscord程序上线了。

国外聊天室工具,可以通过苹果安卓以及pc端进行登录,也可以网页登录。

如果您已经注册以上软件程序,点击主页面,申请加入骇客云的聊天室交流。

邀请链接在主页。

另外官网客服已经转入国际客服使用Drscord聊天工具进行交流。

另外授权业务以及其他业务不受影响。

如果您预留您的微信号,或者邮箱。我们的官网客服会加您好友。感谢。

中国骇客云平台业务说明(业务公告指南)

本站业务包括:建站,域名托管解析服务,服务器托管运维,SEO优化推广,广告推广,关键字词推广服务!
建站包括:虚拟主机,服务器。
域名为全平台托管服务,任何一家的域名服务商,我们可以做域名抢注与解析服务,虚拟主机出售。服务器出售。

虚拟主机价格:

继续阅读“中国骇客云平台业务说明(业务公告指南)”

中国骇客云平台教你揭秘微信支付存在的一些安全漏洞,之前官网上面有介绍,今天另介绍一种方法提醒网民。

首先这里介绍一种微信的支付安全尝试算是一些支付的一种安全策略漏洞。|
以前官网介绍的是一种二维码直接支付免密支付一种安全漏洞,那么今天官方网站介绍一种更为牛逼的支付免密支付、
教程开始:
首先打开微信,点击+号,点击收付款,点击第一行条形码,点击上面灰色文字显示:“点击可查看付款码数字”而支付胡付款码数字一旦被泄露给黑客或者是有心人,将会造成财产损失。
这里本站测试了 中国石化加油 使用该付款码进行支付,那么这些付款均存在以上的安全支付问题,容易造成付款码泄露。
微信厂商做了实时更新付款码,但是以上安全漏洞还是可以被利用。
条形码就是把付款码存储在条形码中使用机器扫描支付,如果条形码或者以上支付二维码,支付付款码被泄露,那么就会造成用户的财产损失。
这里就不上图了……
更多请关注本站官方网站。

Anonymous Launches OnionIRC, Specifically for “Training the Next Generation of Hackers”

Anonymous members on the deep web have launched a new chat service specifically “to teach the next generation of hacktivists.” What sets this chat apart from others is that unlike AnonOps IRC, the chat will not be used to plan or conduct missions. Unlike services offered by AnonHQ, 4Chan or Reddit, it will not be used for general conversation and information sharing.

As stated in the video below, in response to the efforts of government around the world to censor the movement, the chat hopes “to arm the current generation of internet activists with education.” Their plan is to provide virtual classrooms where teachers can give instruction on a variety or subjects including security culture; hacking & technical tutorials; history; and how to properly utilize encryption & anonymity software.

 

How To Access OnionIRC

A step-by-step tutorial on how to connect to the OnionIRC using your Tor Browser and the HexChat IRC client can be found below:

Step 1:DownloadTor BrowserandHexChat. You can download them from Softpedia mirrors, or from their homepages.

Step 2:Open HexChat and clickADD. A screenshot of the appropriate settings is available below.

HexChat login settings

In theLogin Methodsection, you can leave those fields blank for the first visit. After you connect to the IRC for the first time, make sure to register an identity.

The rest of the information you need to keep in mind, is the OnionIRC URL and port, which are:onionirchubx5363.onion/6667

Step 3:Open the Tor Browser, and keep it open for the time you are on the OnionIRC. In HexChat’sSettingsoption, go toNetwork, and then toNetwork Setup.

Here you’ll set up a proxy server with the details from the image below. Keep in mind that, every time you close the Tor Browser, these settings will be wiped, and you’ll have to apply them all over again. That’s it, you’re done. Connect to the OnionIRC.

HexChat proxy settings

You can follow the movements, find new class schedules and download content previously covered on the Anonymous OnionIRC Twitter page:https://twitter.com/onionirc

How Else To Reach Anonymous

AnonBoardsConnected with AnonHQ.Open web chat and online forums:www.anonboards.com

AnonOps IRCHot action and adventure. Home to#AntiSec,#LulzSec:https://newblood.anonops.com/|https://anonops.com/|https://webchat.anonops.com/

AnonNet IRCThe father of anon IRC’s. For lulz, fun, chat, tech:http://site.anonnet.org/

CyberGorilla IRCOnly accepts TOR connections. Small and secure community:https://cyberguerrilla.info/irc-client-setup/

4Chan Random Board:http://boards.4chan.org/b/

Reddit Anonymous Board:https://www.reddit.com/r/anonymous/

Reddit WTF Board:https://www.reddit.com/r/WTF/

Anonymous Security Guide 2.0

anonymous-1920-1080-wallpaper

After releasing the first Anonymous Security Guide last fall, with feedback from the public, updated features, downloads and popular requests, we bring you version 2.0

At the very least, if you are going to interact with Anonymous you need to have a VPN. This should literally beSTEP 1:

What is a VPN?

A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider.

So what does this mean? To put it most simply: If someone tries to log your IP, this person will see the IP of your VPN service provider, protecting your personal computer. It will cost you money for a good VPN service, but you do get what you pay for in this industry. However, even on the lower end of price range spectrum, most VPN services do an adequate job.

Below are two of the most trusted VPN servers, there are of course many others if you do the research. We recommend the following services because they allow users the most options/control over settings. They are also some of the most highly rated VPN services by several leading sites.

– Buy IPVanish:https://www.ipvanish.com/?a_aid=anonymous&a_bid=48f95966

– Buy Nord VPN:https://nordvpn.com/

– Buy Perfect Privacy VPN:https://www.perfect-privacy.com/?gclid=Cj0KEQiAg7ayBRD8qqSGt-fj6uYBEiQAucjOwYQqT0ho9VC8S9rjMgNJzBtuSux96TjpYkgA8NwkxcwaApBF8P8HAQ

– Buy HideMyAss VPN:https://www.hidemyass.com/?ecid=ad:go:se:US-EN-VPN-Brand-Search&gclid=CjwKEAjwtqe8BRCs-9DdpMOilBoSJAAyqWz_pFbMiSbosSabHsaR_FukURXOIFEI6Nayg15yJ0wZUhoCd1Dw_wcB

– Buy MullVad VPN:https://mullvad.net/en/

Free VPN’s do exist, but use at your own risk. The most trustedfreeVPN’s appear to be RiseUP VPN & BetterNet VPN.<–I have recommended these to countless users over the last year and have not heard one negative thing about either.

– Download RiseUp VPN:https://help.riseup.net/en/vpn

– Download BetterNet VPN:https://www.betternet.co/

For those of you who are more advanced, or complete computer nerds, here is a tutorial on how to manually set up a VPN within your own computer. If done successfully, this will protect your computer better than any paid service and will offer more protection for your personal files:http://anonhq.com/how-to-manually-setup-vpn-on-pc-anondos/

CyberGhost offers a free and paid VPN service, however, I have heard from multiple Anonymous sources that not only is CyberGhost the easiest VPN to hack through, but it also regularly coordinates with the FBI.

This leads us to our next piece of advice, when selecting a VPN service,DO NOT SELECT ANY VPN BASED OUT OF THE UNITED STATES!

The reason for this is simple, its not that these companies are evil or offer an inferior product, it is because there is no containing the power of the United States government from within the United States. For example, in the US, a simple subpoena -which legally does not even have to be reviewed by a court or judge – is all that is required to force corporations and companies to overturn data and information to the federal government – under severe penalty of law.The FBI has even convinced US Congress to pass a new law, essentially criminalizing the use of security software– such as VPN’s – to take effect in the near future.

On the other hand, an international court made a landmark decision July 14th 2016declaring that foreign companies do not have to comply with US warrants or requests for information stored on foreign servers/databases. So stay safe, protect your data and use a foreign based VPN.

Outside of the federal government, a VPN alone should be enough to protect you from the average person on the internet – 99% of ‘white hat hackers‘. But once you have one, you are ready forSTEP 2:setting up some sort of proxy protection.

What is a Proxy?

Aproxy serveris a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server, then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client’s request or the server’s response for various purposes.

There are different ways you can go about creating a proxy. The most most simple way is to use a browser with built in proxy protection – many people have traditionally used the Tor browser for this.

A proxy browser is helpful because it will conceal the IP of your computer on whatever web site you are using. If someone is trying to log your IP on a site, or the site you are using logs your IP, they will pick up the Tor exit node your computer is using at that particular time, not your personal IP. If someone is able to crack through the Tor proxy, which almost no one is capable of doing outside of federal governments, they will still end up having to face your VPN. So, if you sign into your VPN first, then proxy second, the proxy browser will protect your VPN. In this way, it creates a duel level protection.

Previously, it was discovered thatthe FBI was able to exploit the Tor Browser through a hole in the flash player. This has now been patched and the latest version of the browser was released June 2016.

Download Here:http://news.softpedia.com/news/tor-browser-integrates-tool-to-fend-off-deanonymization-exploits-505418.shtml?utm_content=buffer2791f&utm_medium=social&utm_source=facebook.com&utm_campaign=buffer

Tor has been struggling a bit in recent times. Earlier this year,the FBI launched a War on encryption,using federal courts toforce tech companies to install back-doors on encryption protocol. Rulings to whichthe FBI promised to continue to use the courts systems to defeat encryption rights. In response to these developments,the Tor Project announced if they were ever forced by the court systems to overturn their encryption protocol, they would shut down the network altogether rather then comply. A scary thought for privacy advocates

This June,the Tor Project got a new board of directorsafter sexual abuse scandal and less than week after this, the Tor Project announced thatone of the core contributors to the Project was leaving and shutting down critical servers– destroying key, trusted exit nodes in the process. Then, this July, news was released revealing how well over100 Tor exit nodes have been designated for the sole purpose of tracking/monitoring deep web users.

These events came on the heels ofMIT announcing they have developed a superior, safer network alternative to the Tor network. Needless to say, it may be time to start looking for alternatives to Tor and many already have.

One of these recent alternatives can be found in the Opera browser. Opera has been less popular over recent years, but it has been redesigned in 2016 and now offers its own built in VPN. Opera now also offers an incognito mode, similar to Mozilla, which does not record cookies or browser history once turned on. More and more Internet users are making the switch to Opera, mainly because of their new VPN.

Download Here:http://www.softpedia.com/get/Internet/Browsers/Opera-for-Windows-without-Java.shtml

Find Other Free Browser’s With Built In Proxy Protection Here:http://www.omgtop5.com/proxy-browsers-for-windows/

So, now that you have your VPN and proxy browser. WithSTEP 3, you can add onproxy chain.

The longer the chain the longer/harder it will take for anyone who wants to hack into you. Every proxy that a hacker can bypass will lead them straight to another proxy address which leads to another, so on and so forth. If someone can somehow get through all of them, they end up at your browser proxy, then VPN – this is how proxy chains will add a third layer of protection.

It is rare to encounter proxy chains, but for this same reason, it is much more effective than a standalone VPN. Let it be noted, mush like with paid VPN services, if you pay for a proxy chain, you get what your pay for. If you are interested, here are some links to teach you how to manually set up your own proxies for free:

– How To Proxy Chain Using Internet Explorer and Tor:http://resources.infosecinstitute.com/proxy-chaining/

– Add Proxy’s With FoxyProxy for Mozilla:https://www.youtube.com/watch?v=mM-soqYrdVg

– Alternative Tutorial: Creating Proxy Chains:http://tech-blog10.blogspot.com/2011/09/proxy-chaininguse-multiple-proxies-to.html

Now that you have all the outside protections in place, you are going to want some internal protection. Believe it or not, even with a VPN and proxy, your computer may still leak your IP to web sites. This is done through something known as the WebRTC, which makes a “real time connection” to each web site you visit.Even with protections turned on, this “connection” can be made, and depending on the site or configuration, will leak your IP– undermining your VPN and making it useless.

STEP 4, You are going to need to install something to Disable WebRTC. This will be free and easy.

Disable WebRTC for Firefox:https://addons.mozilla.org/en-us/firefox/addon/happy-bonobo-disable-webrtc/

Internet Explorer, Tor and Safari do not enable WebRTC – yet.

**WARNING: There was an app available to block WebRTC from Google Chrome but it has been deleted by google and you will be vulnerable on that browser. Ditch Chrome and Gmail altogether if you care at all about protecting your privacy. See alternative emails lists further down the article**

To Test If Your Browser Is Leaking Your IP through WebRTC Test Here:https://www.browserleaks.com/webrtc

STEP 5:This next bit may not be completely necessary and may make browsing the Internet annoying until you get used to it, but it does serve as a last line of defense either way. So, if you want lock tight security, you are going to want a Java Script blocker. No Script is a free open source java blocker, which allows your to peal back java script on websites, layer by layer. You can customize settings for every unique website you enter easily with just the click of a button.

Install No Script:https://noscript.net/

Additionally, to get rid of all those pesky advertisements, install AdBlock Plus:https://adblockplus.org/

Safer Alternatives To Gmail

Ghostmail.This service allows you to sign up to an encrypted email service. The server is located in Switzerland and offers free end to end encryption on all emails. The service also has a built in “self destruct mode” which, when turned on, will automatically delete any message after it has been read – Mission Impossible stye. At no point in signing up for this service are you asked to confirm anything or give away any personal information.Sign Up Here:www.ghostmail.com

ProtonMail.Another service offering free end to end encryption who’s services are located in Switzerland –outside of US laws and jurisdiction. Like Ghostmail, at no point in time are you asked for any personal information. If you are a fan of the Television show “Mr. Robot” this is Elliot’s email of choice.Sign Up Here:https://protonmail.com/

Tutanota.This is another free encrypted email service that has become quite popular in recent times. Earlier this year,Tutanota surpassed 1 million accounts, becoming the largest online encrypted email service on the internet. Tutanota makes their encryption code open source so security experts can confirm the level of security they will be receiving.Sign up Here:https://tutanota.com/

** WARNING: Never open an email from a sender you do not know. It might seem harmless, but the simple act of opening an email can send the IP Address of your computer to the sender of that email. It is extremely simple for a hacker/phisher to set this up **

Always use caution when clicking on links in an email, online chat, social networking posts, even from someone you may know, but particularly by sources you do not. Clicking on a link that appears to be benign in nature may in fact contain embedded malware or IP loggers that can compromise your computer. Once compromised, the data on your computer can be exploited and even your computer can be remotely operated as a surrogate in online attacks against others.

– Test Hyperlink URL’s Before You Click for Malicious/Hidden Content:http://onlinelinkscan.com/

– Test Recent Downloads for Malicious Content:https://virscan.org/

**If you find that you have downloaded something malicious and own a windows computer, go to start/system restore/select a date prior to the download and reset your system. This will reboot your system to a time before it was effected by the virus**

Always make sure that your firewalls are turned on, your anti-virus software is up to date and you have disabled remote access connection to your computer.

Use CCleaner on a (fairly) regular basis. This is a free disk cleaner tool “on steroids”. It works by searching for and deleting useless files on your computer, thus freeing up your hard-drive. Asexplained by How-To-Geek, “it will also erase your browser history, cookies, and cache files for any browsers you have installed — Internet Explorer, Firefox, Chrome, even Opera. It will even erase the cookie data stored by your Flash Player. It will even wipe out other potentially privacy-risking data, such as the list of recently opened file names in Microsoft Word, Adobe Reader, Windows Media Player, VLC media player, and other common Windows applications.”

Please note, if you use CCleaner, you should save or write down all the passwords to your online accounts before using. You would be surprised how much information the internet and your computer remembers about you – until every bit of it is deleted.

Download CCleaner:http://www.softpedia.com/get/Security/Secure-cleaning/CCleaner.shtml

How To Keep an Anonymous Identity On The Internet

Invent an alias, a surname if you will, with a name of your choice. Go and register this name with one of the email service providers located above. Use this new email to register any new Twitter, Facebook, Instagram, et cetera accounts. Be sure to clear all browser cookies before using this alias, or better yet, use a different web browser for your anonymous identity than you would use for your more typical internet activity. If you can not remember passwords or account information for this, store then in an encrypted file (encryption tutorials located further down the article).

Hide your profile from search engines. This can be accomplished by going to the Account/Privacy Settings/ Search and unchecking the “Public Search Results” box. This will remove your public preview from Google, Bing, and Yahoo search returns.

How To Kick Someone From Your Computer

If you ever sense that someone is on your computer, you can use the following sequence to boot them off your computer, at least temporarily. You can use the command inboldon a regular basis. It will not disrupt your Internet connection.

  • Open cmd window
  • title Hacker (press enter)
  • color a (enter)
  • echo off (enter)
  • cls (enter)
  • ipconfig/flushdns(enter)
  • ipconfig/release(enter)
  • ipconfig/renew(enter)

If you want to try and find the IP address of that person on your computer open cmd and use:netstat -nornetstat -anornetstat -anp.

– cmd Commands Encyclopedia for Windows:https://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/ntcmds.mspx?mfr=true

– Linux Bash Commands Encyclopedia:http://ss64.com/bash/

– Terminal Commands Encyclopedia for Mac:http://ss64.com/osx/

– DOS Commands Encyclopedia:http://www.computerhope.com/msdos.htm#02

Additional Safety Tips/Advice

How To Make Your PC Safe | By: Anon.Dos:http://anonhq.com/make-pc-safe/

How To Encrypt Your Hard Drive:http://www.pcworld.com/article/153826/data_encryption_tools.html

Learn To Encrypt Your Files on Windows, Linux & Mac:http://www.howtogeek.com/195124/how-to-easily-encrypt-files-on-windows-linux-and-mac-os-x/

Enable BIOS Protection For Added Security:http://www.pcworld.com/article/158292/Enable_BIOS_Passwords_for_Extra_Security.html

Learn To Create Un-Hackable Passwords:http://www.inscribd.com/how-to-create-an-unhackable-password-youll-remember/

How To Secure Your Windows Phone:https://ghostbin.com/paste/vromn

How To Secure Your Android Phone:https://ghostbin.com/paste/oehzj

Iphone Encryption Advice From Edward Snowden:https://theintercept.com/2016/02/18/passcodes-that-can-defeat-fbi-ios-backdoor/

If you care about privacy and protection, here is why you may want to learn to make a switch from Windows to run a Linux OS:http://www.pcworld.com/article/202452/why_linux_is_more_secure_than_windows.html

For complete security, download the Linux based TAILS OS:http://news.softpedia.com/news/tails-2-4-edward-snowden-s-favorite-anonymous-live-cd-brings-tor-browser-6-0-504942.shtml?utm_content=buffere4b90&utm_medium=social&utm_source=facebook.com&utm_campaign=buffer

Installing The Anonymous Operating System:https://anonguide.cyberguerrilla.org/

Anonymous Just Took Down 1/5 Of Dark Web’s Child Pornography(暗网访问以及连接地址都有可以翻译去直接疯狂一下吧!)

Anonymous

The Dark Web is the encrypted network that exists between Tor servers and their clients aka cyber criminals, activists and many others who want encrypted communications. The Tor Network, the only network that protects the user’s identity and does not watch their Internet activities, helps Internet users retain their privacy online — especially when they are being watched by third parties.

Since most of the Dark Web is a haven for drug markets, pedophiles and sex traffickers who use Tor or set up anonymous .onion websites to hide their location and to ply their illegal trade, it becomes difficult for law enforcement to unmask the criminals seeking refuge in the shadows.

In their attempt to uncover the creators, possessors, and subscribers of child pornography,a group of anonymous hackers breached Freedom Hosting II —the largest host of Dark Web sites accessible only through Tor — downloaded gigabytes of data, and took down and defaced some 10,613 .onion websites.

The anonymous hacktivists claimed over 50% of the data stored on the Freedom Hosting II servers contained child pornography.International Business Timesreported that thehackers stole 75 GB worth of files and 2.6 GB of databases, which they offered to return for 0.1 bitcoin, around $100.

torAccording to Sarah Jamie Lewis, an independent anonymity & privacy researcher who spotted the mass hack as part of her regular scans of the Onion space (Dark Web sites running on the Tor network), Freedom Hosting II was hosting an estimated 15% to 20% of all websites on the Dark Web.

This means that the hack took down nearly a fifth of the Dark Web. Lewis toldThe Verge: “This is a major blow considering many were personal or political blogs and forums. In the short term,a lot of diversity has disappearedfrom the Dark Web.”

Security researcher Chris Monteiro claimed the Freedom Hosting II hack may have disrupted a substantial number of botnets, which are increasingly used by cyber criminals to launch large-scale DDoS attacks.

Monteiro also discovered the .onion websites were not only hosting botnets, but also fraud sites, sites peddling hacked data, weird fetish portals, and child abuse sites targeting both English and Russian speaking buyers. Websites defaced inthe Freedom Hosting II hackinclude:

 

In an interview withVICE, the hackers explainedwhy and howthey took down the Dark Web hosting provider:

“Initially we didn’t want to take down FHII. But thenwe found several large child pornography siteswhich were using more than Freedom Hosting II’s stated allowance. Usually, Freedom Hosting II has a quota of 256MB per site, but these illegal sites comprised of gigabytes of material. This suggests they paid for hosting and the admin knew of those sites. That’s when I decided to take it down instead.”

torIn 2011 also, as part of Operation Darknet,anonymous hacked and DDoSed the first Freedom Hostingfor hosting child pornography websites. In 2013, when the first Freedom Hosting was hosting half of all Dark Web sites, the FBI used a misconfiguration in the Tor Browser setup to identify visitors to such websites, took down the service, and arrested its owner Eric Eoin Marques in Ireland. Charges laid against Marques were of facilitating the distribution of online child pornography.