If freedom is the issue, a permit would be the same to announce and paint a target on yourself. Wouldn't be?
You do loose anonymity with HAM, but you COULD hypothetically broadcast from somewhere other than your home without using your call sign.
If you have nothing to hide, you have nothing to fear. The right thing to do is to stop promoting disgusting and illogical Nazi theories and instead accept Hashem into your life. That way you wouldn't have to worry about internet censorship/monitoring because you wouldn't have anything to hide.
Wont known strategies help with this problem? I.e.: Signal hopping
If really they manage to take down TOR and other IRC or alternate methods, this is indeed one of our last resorts.>>241899
Also reflectivity, having different sources, or being just plain mobile and never static, like, on a car… that's how you can avoid triangulation, and be really anonymous.>>241819>>241817
Ham is really just like Facebook, if you get caught, bye bye radio, and more trouble, but if really you intend to transmit info, there's still CB (pic related) and a few open frequencies that doesn't require a registration, and well, in the hacker state of mind, the laws are just a suggestion. Especially if they are against you.
Voice over CB is meh, but I estimate with a good controller / modem and a full duplex, we could reach 115200 bauds, without the TCP/UDP and clusterfuck proper to internet, since we have a different kind of communication.
Sneakernet is also good.
>>241926>If really they manage to take down TOR and other IRC or alternate methods, this is indeed one of our last resorts.
No it's not. Back in the day I ran a BBS. The sophistication of what we would do with modems was pretty fucking amazing. We had networks that would distribute the latest posts via modem, etc. There were multiple "nets" your BBS would become a member, and daily or more, dial into a local node, upload your boards posts, download the rest, etc.
Around the same time, USENET was transferred between schools via UUCP and modems or very slow dedicated lines.
Anyone with a copy of renegadeBBS or any of the others BBS systems, or a copy of linux and UUCP could work this out again. Both systems worked great. There's no reason we can't go back to them, and even run either over TOR, etc.
What, no one remembers UUCP and the networked BBSes? I'm only genx here, not a boomer.
I grew up on BBSes and FidoNet.
It shouldn't be too complicated to make a prebuilt Raspberry Pi setup with UUCP and some other privacy related tools. I'm thinking an anonymous remailer, Roundcube (self hosted webmail), FreeNet, etc. You'd end up with a communications platform that ideally anyone could install and run.
The thing I don't know how to accomplish is how to run everything behind a router and still let everyone talk to each other without having to go through a central server. Maybe use Tor, just for that part?
To be relevant to the thread topic, it should be possible to run UUCP over ham radio as well, pretty sure that's something that has been done.
FidoNet was one, couldn't remember their names. That would be really cool, having a RPi set up to be your own TOR anonymous mail host. It's too bad, AFAIK, SMTP doesn't support interoperability with TOR. If you want to receive email, you have to have a clearnet DNS address. Unless there was a TOR only protocol… That could be interesting. If it caught on enough, it could be built into sendmail…
Have you used AX.25? I only know that A: a thing with this name exists, and B: it's some form of packet switched network, probably.>>243715
Couldn't you just have your address be firstname.lastname@example.org or something? It would have to be a closed network of course.
Anyway, Tor is neat, but not that great from a security point of view when The Global Passive Adversary can see the traffic both going in and coming out as it happens.
That's why a high latency network where "message sent" and "message received" happens at different times seems better, and UUCP+remailers could be used to do it. And, for the purposes of this thread, could reasonably run over radio links too.
>>243827>Couldn't you just have your address be email@example.com or something? It would have to be a closed network of course.
Yes, exactly. If by "closed" you mean "doesn't interoperate with regular e-mail" then yes, it would need to at least start that way. There could actually be real demand for this. Also, if a lot of people put up onion email servers, and those people served just a few tor links, the network would actually become much more anonymous.
It is based of of X.25, itself an intensely important informational backbone as X.25 is still used to coordinate data transmissions for things like ATMs. It's an intensely reliable protocol suite despite being made in the late 60's and 70's. Excellent for low bandwidth tx'ing.
There's a service sort of like that on i2p. It's a mail server with an i2p address of mail.i2p and a clearnet address of i2pmail.org. You and your trusted associates can connect to the server exclusively from i2p via mail.i2p, and those who have to communicate from the clearnet can still send you mail via i2pmail.org. Assuming you don't send or recieve any personally identifiable information to or from any clearnet e-mails, you can stay pretty anonymous this way.
i2p in general is better than tor imo. It supports e-mail and torrents, isn't reliant on dedicated nodes that could be set up by glowniggers, by default goes through more layers than tor, and it wasn't created by the US government. The only downside is that communication with the clearnet through i2p requires someone to run dedicated services for it, so right now there's no publically-available way to browse clearnet sites from i2p.
Ive heard of ham radio autism. Apparently you can send image data through it. Any good guides? https://youtu.be/vtexMEqAuZ0
Da jews movie man knows how to ham
Speaking of alternate communication. Some dudes on 8chans bunker /tech/ were talking about irc over i2p or tor. Do you guys know anything about that? My only experience with irc is downloading stuff using hexchat.
Also theres apparently a "proper" way to set up tor (for max anonymity), but i couldn't find any information on it when i did a quick google search
>>252781>Also theres apparently a "proper" way to set up tor (for max anonymity)
If I understood well how TOR works, the best way to get some chance of anonymity is to hook to relays located outside the reach of the adversary, so to bypass its traffic collecting capabilities.
Just use CB and a Linear amplifier. The FCC could give two shits about those frequencys
Some irc servers will allow you to connect via tor protip: not rizon
, and there's at least one public irc server that's on i2p exclusively. Connecting to irc via tor can be as simple as opening a webirc client from torbrowser or running your irc client with torsocks. As to just how secure and functional those methods are, I'm not entirely sure.
The FCC has too much time on their hands. They will fuck you if they can.
I mean if you don't have a license there would be no way they could catch you broadcasting if you broadcasted away from your home.