If freedom is the issue, a permit would be the same to announce and paint a target on yourself. Wouldn't be?
You do loose anonymity with HAM, but you COULD hypothetically broadcast from somewhere other than your home without using your call sign.
If you have nothing to hide, you have nothing to fear. The right thing to do is to stop promoting disgusting and illogical Nazi theories and instead accept Hashem into your life. That way you wouldn't have to worry about internet censorship/monitoring because you wouldn't have anything to hide.
I have my technician class. This is my main hand held. 6.7 watts PEP. It’s dual band and if shit gets real it has non trunking DMR for digital encryption.
Wont known strategies help with this problem? I.e.: Signal hopping
If really they manage to take down TOR and other IRC or alternate methods, this is indeed one of our last resorts.>>241899
Also reflectivity, having different sources, or being just plain mobile and never static, like, on a car... that's how you can avoid triangulation, and be really anonymous.>>241819>>241817
Ham is really just like Facebook, if you get caught, bye bye radio, and more trouble, but if really you intend to transmit info, there's still CB (pic related) and a few open frequencies that doesn't require a registration, and well, in the hacker state of mind, the laws are just a suggestion. Especially if they are against you.
Voice over CB is meh, but I estimate with a good controller / modem and a full duplex, we could reach 115200 bauds, without the TCP/UDP and clusterfuck proper to internet, since we have a different kind of communication.
Sneakernet is also good.
This video fills the gaps about general info.>Intro to Ham Radiohttps://www.bitchute.com/video/vtexMEqAuZ0/
>>241926>If really they manage to take down TOR and other IRC or alternate methods, this is indeed one of our last resorts.
No it's not. Back in the day I ran a BBS. The sophistication of what we would do with modems was pretty fucking amazing. We had networks that would distribute the latest posts via modem, etc. There were multiple "nets" your BBS would become a member, and daily or more, dial into a local node, upload your boards posts, download the rest, etc.
Around the same time, USENET was transferred between schools via UUCP and modems or very slow dedicated lines.
Anyone with a copy of renegadeBBS or any of the others BBS systems, or a copy of linux and UUCP could work this out again. Both systems worked great. There's no reason we can't go back to them, and even run either over TOR, etc.
What, no one remembers UUCP and the networked BBSes? I'm only genx here, not a boomer.
I grew up on BBSes and FidoNet.
It shouldn't be too complicated to make a prebuilt Raspberry Pi setup with UUCP and some other privacy related tools. I'm thinking an anonymous remailer, Roundcube (self hosted webmail), FreeNet, etc. You'd end up with a communications platform that ideally anyone could install and run.
The thing I don't know how to accomplish is how to run everything behind a router and still let everyone talk to each other without having to go through a central server. Maybe use Tor, just for that part?
To be relevant to the thread topic, it should be possible to run UUCP over ham radio as well, pretty sure that's something that has been done.
AX2.5, coupled with one time pads and burst transmissions.
It's quite the nightmare for SIGINT.
FidoNet was one, couldn't remember their names. That would be really cool, having a RPi set up to be your own TOR anonymous mail host. It's too bad, AFAIK, SMTP doesn't support interoperability with TOR. If you want to receive email, you have to have a clearnet DNS address. Unless there was a TOR only protocol... That could be interesting. If it caught on enough, it could be built into sendmail...
Have you used AX.25? I only know that A: a thing with this name exists, and B: it's some form of packet switched network, probably.>>243715
Couldn't you just have your address be [email protected]
or something? It would have to be a closed network of course.
Anyway, Tor is neat, but not that great from a security point of view when The Global Passive Adversary can see the traffic both going in and coming out as it happens.
That's why a high latency network where "message sent" and "message received" happens at different times seems better, and UUCP+remailers could be used to do it. And, for the purposes of this thread, could reasonably run over radio links too.
>>243827>Couldn't you just have your address be [email protected] or something? It would have to be a closed network of course.
Yes, exactly. If by "closed" you mean "doesn't interoperate with regular e-mail" then yes, it would need to at least start that way. There could actually be real demand for this. Also, if a lot of people put up onion email servers, and those people served just a few tor links, the network would actually become much more anonymous.
It is based of of X.25, itself an intensely important informational backbone as X.25 is still used to coordinate data transmissions for things like ATMs. It's an intensely reliable protocol suite despite being made in the late 60's and 70's. Excellent for low bandwidth tx'ing.
There's a service sort of like that on i2p. It's a mail server with an i2p address of mail.i2p and a clearnet address of i2pmail.org. You and your trusted associates can connect to the server exclusively from i2p via mail.i2p, and those who have to communicate from the clearnet can still send you mail via i2pmail.org. Assuming you don't send or recieve any personally identifiable information to or from any clearnet e-mails, you can stay pretty anonymous this way.
i2p in general is better than tor imo. It supports e-mail and torrents, isn't reliant on dedicated nodes that could be set up by glowniggers, by default goes through more layers than tor, and it wasn't created by the US government. The only downside is that communication with the clearnet through i2p requires someone to run dedicated services for it, so right now there's no publically-available way to browse clearnet sites from i2p.
>Learn to Send Perfect Morse Code by Hand
>What is the proper (and most efficient) technique for creating Morse code by hand, using a manual Morse code key? Ham radio operators find Morse code (and the 'CW' mode, or 'Continuous Wave' keying mode) very useful, even though Morse code is no longer required as part of the licensing process. Morse code is highly effective in weak-signal radio work. And, preppers love Morse code because it is the most efficient way to communicate when there is a major disaster that could wipe out the communications infrastructure.
>While this military film is antique, the vintage information is timeless, as the material is applicable to Morse code, even today.
Ive heard of ham radio autism. Apparently you can send image data through it. Any good guides? https://youtu.be/vtexMEqAuZ0
Da jews movie man knows how to ham
Speaking of alternate communication. Some dudes on 8chans bunker /tech/ were talking about irc over i2p or tor. Do you guys know anything about that? My only experience with irc is downloading stuff using hexchat.
Also theres apparently a "proper" way to set up tor (for max anonymity), but i couldn't find any information on it when i did a quick google search
>>252781>Also theres apparently a "proper" way to set up tor (for max anonymity)
If I understood well how TOR works, the best way to get some chance of anonymity is to hook to relays located outside the reach of the adversary, so to bypass its traffic collecting capabilities.
Just use CB and a Linear amplifier. The FCC could give two shits about those frequencys
Some irc servers will allow you to connect via tor **protip: not rizon**, and there's at least one public irc server that's on i2p exclusively. Connecting to irc via tor can be as simple as opening a webirc client from torbrowser or running your irc client with torsocks. As to just how secure and functional those methods are, I'm not entirely sure.
The FCC has too much time on their hands. They will fuck you if they can.
> It is impossible for (((them))) to shut it down
> provided you own the equipment and a license
OP didn't think this through...
I mean if you don't have a license there would be no way they could catch you broadcasting if you broadcasted away from your home.
This is because in a time of revolt people would coordinate with encrypted HAM frequencies. It's been talked about quite a bit on the Chans before so (((they)))'re aware of it.
Awareness =/= control, that's why
HAM would be the go-to
What all equipment do you need to connect to HAMnet?
>>259574>What all equipment do you need
I think this broad question can be better answered knowing what it is about HAM radio to begin with.>What is Ham Radiohttps://www.youtube.com/watch?v=wDn-6SDxyD4
Some interesting DIY stuff:>Transmitting DATV with a just a Raspberry Pihttps://www.rtl-sdr.com/transmitting-datv-with-a-raspberry-pi/
I've tried this thing. On receiving end is a Linux machine (x86 or ARM) with an RTL-SDR dongle running leandvb demodulator and vlc to play the video. I believe this thing should be able to transmit arbitrary files with minimal modifications.>Using WiFi Atheros chips in hamradio bands (By patching the drivers)http://yo3iiu.ro/blog/?p=1301