Saturday 14 October 2017
This article has essential information for anyone associated with interest in pen-testing, security, hacking, Social Engineering or other tech topics. We aim to provide beginner to advanced free courses. Courses will be run daily from 01 Nov 2017 and ten students shall be chosen to sit each lesson. a total of 3 tutors shall sit each course to assist with questions and answers. Lessons are being taught via IRC with lesson material available for students to read along.
Our goal is to educate. And we hope you came to learn. No one here will ask you something that would compromise your identity nor ask you to do anything illegal. We may, however, give you the tools and knowledge necessary to commit what some would consider a crime. Creating secure communities is about more than being educated. Fundamentally, it means creating working dynamics of respect, education and inclusion in all our work. Building strong communities that act in solidarity with one another is the best protection against infiltration, disruption and other conditions of repression.
It’s a culture where the people know their rights and, more importantly, assert them in all situations. Those who belong to a security culture also know what behavior compromises security and are quick to work with people who exhibit insecure or oppressive behavior. Security consciousness becomes a culture when a community as a whole adopts this awareness and demonstrates that those behaviors which violate security are unacceptable.
The unfortunate truth is there are some security-ignorant people in the movement and others who have possibly been raised in a “scene” that thrives on bragging and gossiping. It doesn’t mean these people are bad, but it does mean they need to inform themselves and learn about personal and group security. Even seasoned activists make mistakes when there is a general lack of security consciousness in our groups. And that’s where those of you reading this can help.
If someone you know is bragging about doing an action or spreading security-compromising gossip, it is your responsibility to explain to her or him why that sort of talk violates security and is inappropriate.
You should strive to share this knowledge in a manner that encourages the person’s understanding and changes her/his behavior. It should be done without damaging the person’s pride. Show your sincere interest in helping him/her to become a more effective activist. Keep your humility and avoid presenting a superior, “holier than-thou” attitude. Such an attitude can raise an individual’s defenses and prevent them from listening to and using the advice offered. The goal of addressing these issues with others is to reduce insecure behavior, rather than showing how much more security-conscious you are.
Share your concerns and knowledge in private, so that the person does not feel as if they are being publicly humiliated. Addressing the person as soon as possible after the security violation increases effectiveness.
If each of us remains responsible for discussing security information with people who slip up, we can dramatically improve security in our groups and activities. When people recognize that lying, gossiping, bragging, and inappropriate debriefing damages both themselves and others, these behaviors will soon end. By developing a culture where breaches of security are pointed out and discouraged, all sincere activists will quickly understand.
WebChat CyberGuerrilla with Tor Browser = 3ur4xm2japn56c5f.onion/6697
This link will only work once you have installed and configured Tor Bowser Bundle (TBB).
Why CyberGuerrilla is needed. Can you rely on a corporate provider for confidentiality of your sensitive communications? Not only do they (...)
The CyberGuerrilla IRC network will be shut down on February 2020. How to connect to “Onion.IRC #CgAn” with Hexchat. Anonymous Launched “Onion IRC” (...)
The CyberGuerrilla IRC network will be shut down on February 2020. Anonymous “Internet Relay Chat” on CyberGuerrilla. “If your enemy is secure at (...)
Mission Statement: This article has essential information for anyone associated with interest in pen-testing, security, hacking, Social (...)