Lately, r/K does seem to be spreading more exponentially via the email freebies. The last month averaged almost 250% more signups per day than the month before, which was itself about twice the last release’s rate per day. Those who are getting it are telling others who themselves can be relied on to find still more spreaders. I greatly appreciate the help, as readers telling others is the only way r/K will ever take off in politics. The media and conservative establishment will never help, and the Deep State will be horrified to see it dominate the entire political debate.
Unfortunately, I suspect this will lead to increasing signal loss, such as the blog outage we just had. The outage began with a manual reset of page permissions at my host to 0, and when I reset them to 755, someone killed the entire site at the host within the hour. When I complained, I was told it was a false malware alarm, and the site would be up in 48 hours. When I called back to complain again, it turns out nobody had done anything, and after 48 hours the site would have been kept down. These things happen fairly constantly, and not just online.
I cannot control these outages, so when they happen, just roll with them. I’m looking at a Russian Host and Russian VPN, in hopes the site will be left alone for fear of attracting Russian attention at the host, but the bottom line is until I am physically in Russia on freshly Russia-bought tech, moving the site itself overseas probably will not stop the outages when things pick up. If I have to connect from US soil, it is difficult.
It is a sign of the times that those who feel most American find themselves looking behind the old Iron Curtain for freedom. I am increasingly thinking the Apocalypse may be very bad for the most popular voices of the Alt-right, and it may be a wise move for everyone to begin thinking in terms of a temporary tactical retreat to foreign soil, at least until the collapse begins to sort itself out and the government, or the private sector contractors who really run it, are forced to adjust to the vastly reduced resources. If it helps, I would expect many leftist voices that are not machine porperties will also be taken out early on.
On the bright side, I am not the one who spreads r/K Theory now. I have never been able to, and have always relied on those who see its utility, namely all of you. So long as you can share it with others and emphasize its utility, this site can come and go all it needs to, and none of it will matter. Now it is out in the wild, and I am pretty sure it has gone far enough it can’t be taken back.
God’s will is being done, one way or another.
Sorry AC. I disagree. Your blog has radically changed the way I think. I am sure that I am not alone. I don’t do social media, BTW.
An old Army Air Corps saying is, “if you’re taking flak, you’re over the target.”
It just sounds like you have a sucky webhost. Not surprising, a lot of them are rubbish. If you need help switching hosts, let me know. I run the technical side of A King’s Castle (https://www.akingscastle.com).
I figured “they” whacked your site with a DDoS attack. Glad to see it is back up.
I appreciate you giving the book away. I got my copy a few months ago with your last give away.
I was the “Thanks for all the Fish” guy. Was trying to be funny. Thanks for letting me back on.
The book has made all of which you post sooooooo much more understandable.
Keep up the good work. I’ll purchase the other book on Amazon when I finally finish the first one. I’m pretty busy but 2/3 the way through.
Great writing.
You could try setting the site up as a hidden service over Tor. No one will know where it’s hosted. You could have two versions of a site: the one you have now, which is easily accessible over the clearnet but could be shut down, and a version run as a hidden service which people will need to know about to access, but which cannot be taken down. Then just put a link to the hidden service on this site so that people who come here will know that the hidden service exists. Just don’t have the two sites hosted on the same server or by the same hosting provider.
Also, to prevent the possibility of actual malware issues, I’d suggest running the site on a server running Linux or some variant of BSD that’s open source, if you’re not already. If it isn’t too much of a problem and you’re worried enough about the issue, you could try compiling whatever HTTP server you’re using yourself using compiler security features.
The problem I see is all of that has to be set up in the beginning, which is easy before anybody knows what you are up to, but very difficult once you are in the bubble.
Suppose, just hypothetically speaking as an intellectual exercise, someone had the full package in the US, in an area where they operate in large numbers anyway. OPs all around set up over the last few years, 24/7 vehicular with drive-bys on any noise around the house (and in the house), even aviation many times if you linger in areas of the woods without visual to OPs for too long, free control of local utilities through covertly placed assets and even an official “flag” over the entire service area (which a utility worker bitched about the big to-do on every call), to the point Broadband access could be routed through anywhere, and a stingray was set up nearby to catch phone and wireless, and dialup and land-line phone would also be caught since they control the poles. Meaning they would have live keystroke monitoring if they wanted it – and hypothetically, from the current investment, they wanted it.
If they have access to what leaves your system, how do you get access to the server initially, or set up an account, or buy any service, without them getting exactly how you are getting there and then accessing it they same way you did, so they can spoof you? They have the phones, the internet, and are mobile too. Even if you get a sterile machine in a store on the spot, you have to connect to the internet at some point to install antivirus and TOR, and the system is open and they can control what flows into your machine. Is it TOR, or a perfect copy with a backdoor which is designed so your system cannot tell it is not real? That’s even beyond what I will bet are numerous backdoors we haven’t even found yet in the OS. Then you have to at some point connect through a pipeline where they get everything which goes through it in both directions, as it goes through it, which I would assume gives them how to access your site. With what I have seen, I would bet even many VPNs which elude the various eyes are actually controlled operations set up expressly to attract those who are avoiding being checked out. Nobody really knows exactly who is running them or what their motives are. And again, you’d have to set up with them while under coverage to begin with.
It would seem once you are in the bubble, and get full vehicular/aviation when out (not a team, but rather one part of a very well staffed regional, department-like force that probably does a lot of stuff far beyond you, which from reading online seems everywhere of late around any major city), it is extremely difficult to do anything unless you get out of the US and onto hostile soil where they don’t control the pipes and can’t put you in the bubble.
I should also add, if you are in the US, know that your discussing it with me will get you scrutiny. I’m pretty assiduous about not screwing up allies’ lives.
>how do you get access to the server initially, or set up an account, or buy any service, without them getting exactly how you are getting there and then accessing it they same way you did, so they can spoof you?
If you do everything through Tor, they won’t be able to see which website you go to, or see when you purchase the service. They’ll just see that you’re using Tor.
>install antivirus
I don’t know if it would be very effective to do that. Writing malware that evades antivirus programs is exceptionally easy (people sell kits on forums that render malware undetectable for ~$10 a pop). I don’t suppose it will hurt too much — there’s always the possibility that there will be a vulnerability in the antivirus program that allows files being scanned to execute malicious code, but that’s unlikely compared to the massive attack surface in every modern operating system. But I wouldn’t expect it to be too effective.
>TOR, or a perfect copy with a backdoor which is designed so your system cannot tell it is not real?
If you use Linux, everything is signed by the people maintaining your distribution’s package manager. So they could only compromise your download if they can compromise the maintainer’s private keys. The level of security will vary from distribution to distribution, but I’ve talked to the people that maintain Debian’s package manager, and they sign all their packages using an offline keycard (it’s like one of those new credit cards with a chip — all the cryptographic operations are performed on the chip in the card, which cannot be accessed by the keycard reader the card is inserted into or the computer the keycard reader is plugged into). And all packages are signed by all four maintainers, two of whom live outside America.
>numerous backdoors in the OS
If you use Linux or BSD, there couldn’t be any overt backdoors. All code is publicly viewable, and people (including me) routinely check it and would notice if there was some program that overtly allowed someone to connect to the computer or caused the computer to connect to some external server.
The only possible backdoor would be a covert one — a backdoor that didn’t actually operate by listening for an incoming connection. It would have to be disguised as a bug. A buffer overflow in some externally accessible code (like a WiFi driver) or something like that. The best way to deal with that is probably to compile a kernel with security-based compiler options like stack smashing protection, ASLR, RELRO, etc. You could also get a kernel that has the grsecurity patchset, which renders many exploit classes unexploitable.
>Then you have to at some point connect through a pipeline where they get everything which goes through it in both directions, as it goes through it, which I would assume gives them how to access your site.
I don’t know how you’re using the site now, but if you SSH into the server using a key you generate on your computer, anyone observing your internet connection won’t be able to see your login details. They’ll just see you using SSH to connect to some IP. Unless you’re using Tor, in which case they’ll see you using Tor to connect to an entry relay, and your Tor exit relay will be able to see that whoever your Tor circuit belongs to is using SSH. It still won’t be able to see your login information.
Thank you for the reply. I am actually not that computer savy. I’m on a Windows system, so I will have to look into Linux.
My assumption has been if they control the line out and the line in, and maybe the system attached to it, then anything you try to pull down can be switched with what they give you, and your system will do with it what they tell it, and what the screen shows might not necessarily be what is going on behind the scenes as you go from point A, pre-install to point B, post install.
I definitely have to do some reading.