Welcome to our New Forums!

Our forums have been upgraded and expanded!

Cybersecurity series: Part III

Eankhi

New member
Joined
Mar 19, 2020
Messages
33
To the jews that are reading this; it is impossible for you to figure out who I am.

Link to the Cybersecurity series: Part I: https://ancient-forums.com/viewtopic.php?f=3&t=43871

Link to the Cybersecurity series: Part II: https://www.ancient-forums.com/viewtopic.php?f=3&t=43871 Note: I have noticed that the first links to the scripts do not work anymore. It seems that they have been deleted (not by me.)

Personal side-note: Many people do not understand the importance of Cybersecurity. When using the internet, you are not secure unless you apply quite a lot of effort to become secure. This series provides everything you need (I mean the whole series, not just up until now.) Building an Aura of Protection keeps you protected from jews, greys, angels, human enemies and reptilians on the astral and physical levels. It does not protect you from online threats. Jews can figure out who you are by simply analyzing what you have look up and then cross referencing it a million times and find out who you are. NSA does this and that is not a theory. Why expose yourself online when you do not need to? Also, I am sure that at least one person has figured out that I started this series as soon as there were hints that the second covid lockdown was approaching. Covid lockdown is where EVERYONE that has access to the internet will be using it. This information that is being gathered will be used against us one way or other, be it ads, or the worst case scenario, which is not happening, the jewish world order. I know this knowledge that I am sharing is not interesting to most, but please, do not let jews collect data on you. Just because you cannot see, nor feel online threats, it does not mean that they do not exist. They must not be ignored.

In this part of the series, I will be covering the final aspect of Cybersecurity involving Win10. If you have followed the steps in the Cybersecurity series: Part II, you may have noticed that opening the Win10 settings connects you to Microjew. This makes sense, as the settings is a Microjew “program”, in a way. Removing files related to the settings might prevent you from accessing settings, so I did not mess around with it. Fortunately, there is a way to block Microjew from connecting to your computer via settings, and the way to do this is by using a program called PeerBlock. What is PeerBlock? It is a firewall that blocks IPs. It does not prevent programs from accessing the internet, like most firewalls do. This is why it is very useful for blocking Microjew from connecting to your PC, as you can specifically block Win10 IPs and other IPs spying on you (like verijew.)

1) Download the program from here:
https://s3.amazonaws.com/hn62xeffkz4xd8g3qnq8/software/PeerBlock-Setup_v1.2_r693.exe (this is a direct link which will start the download if you click on it.)

Or visit the website https://www.peerblock.com/ and click the download button at the bottom of the page (which is the same thing as clicking the download link above.)

2) Install the program. Make sure you check “Start PeerBlock on system startup.”

And now it is installed!

Every list that you see is not free. You will have a pop-up telling you that it requires a subscription. Whenever the IPs get blocked or not, I do not know, but I assume that they do not get blocked.

Click next and finish to complete the first launch, and begin using the program.

Settings 1 allows you to customize the colors of the text within the white square (which by default shows silver-ish text for allowed IPs, black for blocked, and blue for blocked HTTP.)

Click on List Manager. You will see the same 4 options that you have seen during the previous screens. None of them have any IPs related to Microjew or Verijew, so you are not missing much. If you want to check, select one, and press the X button. The list will be downloaded. Once it is done, go back to List Manager and press view.

In-order to see which IPs belong to whom, you will need to use this website: https://whatismyipaddress.com/ip-lookup. So basically, you right-click every IP you see and copy it, then go to that website, paste it and see if it belongs to Microjew or Verijew or anything that looks very odd. Note: Avoid using the Tor browser when doing this, as you may end up blocking a Tor IP by mistake (as not all Tor IPs are known.)

The peerblock.com website also has some lists that can be used, but they are not free, either. Any link that has iblock in it will require a subscription. Doubting me? Go to the PeerBlock program, and go to Settings 1. At the bottom, you will see I-block Username and Pin. So the Microjew list will not be free.

To prove my point on just how much Microjew actually spies on you, I suggest you add the Microjew list just to see what it is. As I said, I am unsure whenever the IPs actually get blocked without a subscription or not. Here is how to do this:

1) Go to List Manager

2) Click Add

3) In the box to the right of Add URL, paste this: http://list.iblocklist.com/?list=xshktygkujudfnjfioro&fileformat=p2p&archiveformat=gz (obtained from the peerblock.com Lists) and click Ok

4) Close the box.

5) You will get a message saying it is not free. Just press OK.

6) Go back to List Manager

7) Left click on the list you have just added and press view.

Look at those IPs. Take a good long look at the list… These are the IPs that people have found that were related to Microjew. This is why these lists require a subscription. Imagine the time and energy it took to make this list. I can tell you, it took a long time. Now you have a few options;

1) Buy the subscription.

2) Go the cheap way by copying and pasting each IP from the paid list into a list you have made (which will take you a very very long time.

3) Make a list yourself by looking up each IP that appears on PeerBlock and then adding it to your list.

You should now understand how jewish Microjew is and that the ONLY thing they truly care about, even more than money, is metadata. Information is very important to the jews. The price for your metadata has no value and they will pay and do whatever they need to get it. As of recently, IPv6 has been introduced. The entire reason why it came into existence is because there are not a lot of IPv4 left. Well, no shit… Microjew has like what, 1000 IPs just to itself that they use to spy on everyone? And the same also goes for other companies. They have LOADS of IPs that they use for tracking purposes. You block one, that is fine for them, they have another 1000 or so IPs that they can use. Also, Microjew IPs are based off of your location. So if you live in France, i.e, you may have different IPs than someone living in say Brazil.

Here is a list of IPs that I have personally found that I have blocked:

jewmazon:3.232.196.7-3.232.196.7
level 3 communications:8.253.231.254-8.253.231.254
microjew:13.64.188.245-13.64.188.245
microjew:13.68.225.90-13.68.225.90
microjew:13.86.101.172-13.86.101.172
microjew:13.88.23.8-13.88.23.8
microjew:13.90.158.237-13.90.158.237
microjew:13.107.21.200-13.107.21.200
microjew:20.44.239.154-20.44.239.154
akamai:23.11.242.9-23.11.242.9
jewmazon:23.21.43.186-23.21.43.186
akamai:23.59.155.9-23.59.155.9
akamai:23.59.155.24-23.59.155.24
microjew:23.98.151.170-23.98.151.170
akamai:23.198.145.134-23.198.145.134
akamai:23.198.175.194-23.198.175.194
akamai:23.204.42.15-23.204.42.15
akamai:23.204.58.224-23.204.58.224
microjew:40.112.49.67-40.112.49.67
microjew:40.122.171.231-40.122.171.231
microjew:40.127.240.158-40.127.240.158
microjew:51.104.136.2-51.104.136.2
microjew:51.143.111.7-51.143.111.7
microjew:52.137.106.217-52.137.106.217
microjew:52.158.208.111-52.158.208.111
microjew:52.184.206.73-52.184.206.73
microjew:52.184.215.140-52.184.215.140
jewmazon:54.175.167.220-54.175.167.220
microjew:65.52.198.70-65.52.198.70
akamai:69.192.193.125-69.192.193.125
verijew:72.21.81.200-72.21.81.200
verijew:72.21.81.240-72.21.81.240
verijew:72.21.91.29-72.21.91.29
cloudflare:104.18.88.101-104.18.88.101
cloudflare:104.26.11.240-104.26.11.240
microjew:104.40.17.153-104.40.17.153
akamai:104.71.226.85-104.71.226.85
akamai:104.86.178.9-104.86.178.9
akamai:104.92.231.222-104.92.231.222
akamai:104.92.255.222-104.92.255.222
akamai:104.95.255.222-104.95.255.222
akamai:104.104.98.24-104.104.98.24
akamai:104.116.251.173-104.116.251.173
akamai:104.122.146.167-104.122.146.167
level 3 communication:104.210.44.154-104.210.44.154
jewmazon:107.22.246.37-107.22.246.37
microjew:157.55.212.205-157.55.212.205
cloudflare:172.67.75.39-172.67.75.39
akamai:172.232.7.65-172.232.7.65
microjew:204.79.197.200-204.79.197.200
microjew:204.79.197.203-204.79.197.203
akamai:204.237.142.120-204.237.142.120

Opon checking the list’s IPs, you will see akamai. I am sure that 99.99% of you do not know what that is. Here is a description of akamai from jewpedia (I know wikipedia is not a valid source for things, but in this case, it is actually a decent source of information):

“Akamai Technologies, Inc. is a global content delivery network (CDN), cybersecurity, and cloud service company, providing web and Internet security services.[2][3] Akamai's content delivery network is one of the world's largest distributed computing platforms, responsible for serving between 15% and 30% of all web traffic.[4] The company operates a network of servers around the world and rents out capacity on these servers to customers who want their websites to work faster by distributing content from locations near the user. When a user navigates to the URL of an Akamai customer, their browser is redirected to one of Akamai's copies of the website.”

So, what akamai does is that it clones a website, and when people access the real website, it redirects to the cloned website, owned by akamai. This means that you have literally no idea whenever a website you visit is actually the real one, or the akamai one. It says 15-30% of all internet traffic goes through akamai. So, if there are 10 000 000 people using the internet to search for things, 1 500 000 to 3 000 000 people will be connecting to akamai. Jews always operate behind the curtains. So, this entire time that you have been using the internet, you may have connected to akamai a million times without knowing about it. Tools like Wireshark and PeerBlock can help you see which websites use akamai, because you will see an akamai IP when you visit a site that is owned by them. Of course akamai is either owned by jews, or is working with jews. Do you really think that jews would not take advantage of everything that gives them metadata on us Gentiles? Also, Win10 users that are actually using this knowledge will see that akamai always conects to your computer, even without you opening the browser. But that was already obvious that this would be the case, microjew being microjew and all. They work together (another secret partner of microjew.) Here is another very important quote from jewpedia on akamai:

“State of the Internet
The State of the Internet report is a quarterly report Akamai releases based on data gathered from its Intelligent Platform, which provides global Internet statistics such as connection speed, broadband adoption, attack traffic, network connectivity, and mobile connectivity.[25][26]”
And another one that completes the one above:

“Visualizing the Internet
Akamai's data visualization tools display how data is moving across the Internet in real-time. Viewers are able to see global web conditions, malicious attack traffic, and Internet connectivity.[27] In addition, the net usage indices monitor global news consumption, industry specific traffic, and mobile trends.[28] Akamai also offers the Internet Visualization application, which allows users to view real-time data on their mobile device.[29] “

Those quotes literally tell you that akamai is spying on you. See what I meant when I said that jewpedia is a decent source of information in this case? So, if you have been a win10 user for… say 5 years… this means that every day, as soon as you turned on win10, akamai was recording what you were doing. This is a total and complete invasion of privacy, but the jews do not care. All of this being done behind your back, of course. I have noticed that akamai does not connect to your pc when you are using Linux. Now, I have seen many people, even here on the forums, say something along the lines of “switch to Linux.” Well, while using Linux cuts down a large amount of spying, but it does not cut everything. You still do not know which websites are using akamai, and there are in-fact hundreads of behind-the-curtain companies like akamai that record everything that happens over the internet. So Linux is part of the solution, but not the entire solution.

You may either combine these IPs with your list (if you have made one), or download the list (you can have more than one list of IPs).

Below is the link to download the list:

https://eu-gra.ufile.io/get/hi9r4iwi?token=OGU1NWRkMTY5Mzg1NDkxMzc0ZDU0OWUxZmYyMmU4ZmQ5OTdmMjI4ZDE1MmViNDhkZTk0Mzk2MjMxNmZmYWU5YzQ0ZTg3NDM2ZjcwMDE2YTgzNTg4ODBmMTAyYWE2ZGJkZjZlMmEwOWU5OTlmNmYwODUzMDM2MDQzYTBiZDRiN2NUODNhMkMwRHhBejlWbTZWSTZEUUNURjdZR0FZUlR2L0NKbHMweG9uSjFmbXZ5YUlPZ1RlVEx5VUJtbk5tencxZ1lWd3RFQm93ZFIzOG5tL0dSUExOWG5TWVk5My9scHBUaFdsTVk1NklETnlPU3B2TW5lTDlNaDlLbzFhZU1ISUtYRVNsMkpBKzRla1d0cllwa2JjL2dIaFBRUktYQWR1K1FMK1RwZmdjcXZSSGthVmJkZlJBUndXK0pMUVRJaXpEcmJGWFZsaFQxQjdNRy9taVhxZ3VGNTViRlQ2SnJaemZmU2dtcitVVHVjPQ==
(This is a direct link, meaning clicking on it would start the download and that is why it is so long.)

I would also like to mention that if you have used the 3 scripts that I have wrote in the Cybersecuity series: Part II, a lot of the microjew IPs and other IPs have been cut by default, since there are very few Microjew things on your modified win10. I have made my list of IPs from within a VM (more on virtual machines in another part of the series.)

Companies like microjew, verijew, jewmazon, akamai and all other giants believe that they are above the law. Typical jewish behavior. There have been many additions to the law to “protect” online users, but jews always bypass these laws one way or another. Jews are not above the law, they just think they are and they always get away with it by either throwing a typical “Nazi! Anti-Semite!” when the truth comes out or by simply changing their tactics. This is not going to last long, though. The rat droppings shaped as humans (jews of course) are going to go to the garbage bin, where they belong (because who would want to keep rat droppings just laying around?)

And that’s it. This was Part III of “Cybersecurity series.” Stay tuned for the next one!

Hail Satan!
 
HiddenSerpent said:
Very nice, thank you for the three guides, I followed and completed them. I had no problem combining the two lists you provided without having to pay a sub. It only asks me this if i use the chekboxes in list manager.

I look forward to any future cybersecurity (or similar) guides you put down and I wish you a happy and productive week.

Hail Satan!
 
HiddenSerpent said:

The question on my mind related to cybersecurity is whether or not my identity (and others) has already been flagged. I can always stop further traffic being linked to my real identity, but is it already too late if you are caught browsing here with your home IP/windows account/google account, etc?

I know I will be safe from physical harm and I agree that we should prepare as much as possible anyway, but my concern is that my identity and others has already been flagged in some manner.
 
Blitzkreig said:
HiddenSerpent said:

The question on my mind related to cybersecurity is whether or not my identity (and others) has already been flagged. I can always stop further traffic being linked to my real identity, but is it already too late if you are caught browsing here with your home IP/windows account/google account, etc?

I know I will be safe from physical harm and I agree that we should prepare as much as possible anyway, but my concern is that my identity and others has already been flagged in some manner.
I am inclined to believe it may have already happened to many of us. But the thing is, JoS sites have received countless clicks over the years, lots of members and we are ever growing bigger. We are also international and probably every single country has members, or nearly.

Best they could try in the future is making the identities of prominent SS public. For now they act like we don't exist on the public scene but privately they offer bribes, infiltrate the forums, take down our sites, threaten our clergy and try assassinations and of course cursing us.

I agree about our physical safety because of our AoPs and GDs but it's great to take effort to ensure one's privacy too.
 
Blackdragon666 said:
Blitzkreig said:
HiddenSerpent said:

The question on my mind related to cybersecurity is whether or not my identity (and others) has already been flagged. I can always stop further traffic being linked to my real identity, but is it already too late if you are caught browsing here with your home IP/windows account/google account, etc?

I know I will be safe from physical harm and I agree that we should prepare as much as possible anyway, but my concern is that my identity and others has already been flagged in some manner.

I am inclined to believe it may have already happened to many of us. But the thing is, JoS sites have received countless clicks over the years, lots of members and we are ever growing bigger. We are also international and probably every single country has members, or nearly.

Best they could try in the future is making the identities of prominent SS public. For now they act like we don't exist on the public scene but privately they offer bribes, infiltrate the forums, take down our sites, threaten our clergy and try assassinations and of course cursing us.

I agree about our physical safety because of our AoPs and GDs but it's great to take effort to ensure one's privacy too.

This is a very important question. Thank you for asking. The answer is yes and no. Remember, we are Spiritual Satanists and things that are "not normal" are usually normal in our case. I am sure that if you become aware of online threats and start applying cybersecurity knowledge, Satan will somehow make the profiles that the jews have built disappear but it is not going to happen unless you make an effort on your part. I have seen Satan's "miracles" so I know that this is possible.

The thing that is important to understand is that the israeli intelligence, and other **Agencies, could perform a "Man-in-the-middle" attack and record all incoming IPs that visit the JoS. This is not even related to the OS that you are using, and no program can block that type of attack, not even Tor browser (more in depth on this in the next part of the series.) The absolute worst case scenario is making Spiritual Satanism illegal world-wide, then developing an algorithm that finds your identity, and throwing you in prison. This could happen if we lose, so stop fucking around and do RTRs. A lesser worse case is kind of what you said, where your identity is posted online or showed in the media. This would be extremely dangerous either way. Start protecting yourself online today!
 
HiddenSerpent said:
To the jews that are reading this; it is impossible for you to figure out who I am.


I would also like to mention that if you have used the 3 scripts that I have wrote in the Cybersecuity series: Part II, a lot of the microjew IPs and other IPs have been cut by default, since there are very few Microjew things on your modified win10. I have made my list of IPs from within a VM (more on virtual machines in another part of the series.)


Hail Satan!


I have the scripts, if you didn't save them properly here they are.

https://mega.nz/folder/68RERZZI#TN2bD9mmgQNtDWfirYkiOg
 
SATchives said:
HiddenSerpent said:
To the jews that are reading this; it is impossible for you to figure out who I am.


I would also like to mention that if you have used the 3 scripts that I have wrote in the Cybersecuity series: Part II, a lot of the microjew IPs and other IPs have been cut by default, since there are very few Microjew things on your modified win10. I have made my list of IPs from within a VM (more on virtual machines in another part of the series.)


Hail Satan!

Thank you! Great idea to put it all into a downloadable .zip or download each file individually.


I have the scripts, if you didn't save them properly here they are.

https://mega.nz/folder/68RERZZI#TN2bD9mmgQNtDWfirYkiOg
 
HiddenSerpent said:
Blackdragon666 said:
Blitzkreig said:
The question on my mind related to cybersecurity is whether or not my identity (and others) has already been flagged. I can always stop further traffic being linked to my real identity, but is it already too late if you are caught browsing here with your home IP/windows account/google account, etc?

I know I will be safe from physical harm and I agree that we should prepare as much as possible anyway, but my concern is that my identity and others has already been flagged in some manner.

I am inclined to believe it may have already happened to many of us. But the thing is, JoS sites have received countless clicks over the years, lots of members and we are ever growing bigger. We are also international and probably every single country has members, or nearly.

Best they could try in the future is making the identities of prominent SS public. For now they act like we don't exist on the public scene but privately they offer bribes, infiltrate the forums, take down our sites, threaten our clergy and try assassinations and of course cursing us.

I agree about our physical safety because of our AoPs and GDs but it's great to take effort to ensure one's privacy too.

This is a very important question. Thank you for asking. The answer is yes and no. Remember, we are Spiritual Satanists and things that are "not normal" are usually normal in our case. I am sure that if you become aware of online threats and start applying cybersecurity knowledge, Satan will somehow make the profiles that the jews have built disappear but it is not going to happen unless you make an effort on your part. I have seen Satan's "miracles" so I know that this is possible.

The thing that is important to understand is that the israeli intelligence, and other **Agencies, could perform a "Man-in-the-middle" attack and record all incoming IPs that visit the JoS. This is not even related to the OS that you are using, and no program can block that type of attack, not even Tor browser (more in depth on this in the next part of the series.) The absolute worst case scenario is making Spiritual Satanism illegal world-wide, then developing an algorithm that finds your identity, and throwing you in prison. This could happen if we lose, so stop fucking around and do RTRs. A lesser worse case is kind of what you said, where your identity is posted online or showed in the media. This would be extremely dangerous either way. Start protecting yourself online today!
Thank you for your work BTW brother/sister.

One can only imagine how much data the jews have collected on us. It's like how jehovah is taught to be some idiot who spies on you when you do everything. The enemy is obsessed with this kind of thing and they have zero respect for people's privacy.

They really can't suppress the truth anymore. Anti-Semitism is everywhere and at an all-time high.
 
SouthernWhiteGentile said:
Are they any meaningful precautions and programs you can use for a cell phone?

You would have to root your Android phone and remove every google related connection. When doing so you lose ease of use. For example you can not use the app store, and have to download app packages manually.

I do not know about Apple phones.
 
Henu the Great said:
SouthernWhiteGentile said:
Are they any meaningful precautions and programs you can use for a cell phone?

You would have to root your Android phone and remove every google related connection. When doing so you lose ease of use. For example you can not use the app store, and have to download app packages manually.

I do not know about Apple phones.

Lineage os is a good choice, or a rom built off of it, Lineage Os is degoogled i use this one which is based off of lineage os, i simply use f-droid, aptoid, and other app markets if i need apps, but i keep phones simple, and dont do too much on them. however i do like to tinker, if you need me to write up a guide, i can. I do believe that note 3's are a hell of a price you can pick one up for 100 $ degoogle it and then root it with magisk. if you want better battery life i got a battery which makes it last for days, although making it thicker. I dont know why i did this as i never use my phone really.

then get a vpn and make sure to push all data through the vpn, and to turn the phones data off if not using vpn, these settings are in phone settings > networking > vpn

i wanna add something really important.

from my understanding of phones. all phones have two operating systems, the front end which is android, recovery, bootloader, kernel ect..

then the back end. the back end consists of what the phone uses to communicate with the towers and your sim, and from my understanding, this is what the gov, and corps ran by these kikes use to track you, and no rooting or romming your phone will fix this. unless you do not have a sim card. well to be honest i have not verified this with any sniffing tools. they very well could be still able to capture and send data even if you are only connected to a wifi with no sim. and there could be protections in place to prevent observation of data leaks.

phones where made for the sole purpose of world wide big brother globalism communist kikery.

atleast the smart phones of today are. just be careful
 
SATchives said:
Henu the Great said:
SouthernWhiteGentile said:
Are they any meaningful precautions and programs you can use for a cell phone?

You would have to root your Android phone and remove every google related connection. When doing so you lose ease of use. For example you can not use the app store, and have to download app packages manually.

I do not know about Apple phones.

Lineage os is a good choice, or a rom built off of it, Lineage Os is degoogled i use this one which is based off of lineage os, i simply use f-droid, aptoid, and other app markets if i need apps, but i keep phones simple, and dont do too much on them. however i do like to tinker, if you need me to write up a guide, i can. I do believe that note 3's are a hell of a price you can pick one up for 100 $ degoogle it and then root it with magisk. if you want better battery life i got a battery which makes it last for days, although making it thicker. I dont know why i did this as i never use my phone really.

then get a vpn and make sure to push all data through the vpn, and to turn the phones data off if not using vpn, these settings are in phone settings > networking > vpn

i wanna add something really important.

from my understanding of phones. all phones have two operating systems, the front end which is android, recovery, bootloader, kernel ect..

then the back end. the back end consists of what the phone uses to communicate with the towers and your sim, and from my understanding, this is what the gov, and corps ran by these kikes use to track you, and no rooting or romming your phone will fix this. unless you do not have a sim card. well to be honest i have not verified this with any sniffing tools. they very well could be still able to capture and send data even if you are only connected to a wifi with no sim. and there could be protections in place to prevent observation of data leaks.

phones where made for the sole purpose of world wide big brother globalism communist kikery.

atleast the smart phones of today are. just be careful

You have brought up many things that I will be talking about in the next post! Most people think that changing the phone's location makes you anonymous, and it does to a certain extent, but cellphone towers still constantly ping your phone. If that was not the case, then you would not be able to receive any phone calls. More on this soon.
 
HiddenSerpent said:
SATchives said:
Henu the Great said:
ust be careful

You have brought up many things that I will be talking about in the next post! Most people think that changing the phone's location makes you anonymous, and it does to a certain extent, but cellphone towers still constantly ping your phone. If that was not the case, then you would not be able to receive any phone calls. More on this soon.

looking forward to it
 
Hey HiddenSerpent, i also want to be expert in Cyber Security, could you please tell me where to start? Im learning Python and took some course on udemy.com for Cyber Security but could you please tell me if there is something important i should learn first?
 
mendez said:
Hey HiddenSerpent, i also want to be expert in Cyber Security, could you please tell me where to start? Im learning Python and took some course on udemy.com for Cyber Security but could you please tell me if there is something important i should learn first?
You should learn ins and outs of operating systems, networking, and security of both of these. More specifially how the attacks can be made, and also how and when attacks are targeted.
 

Al Jilwah: Chapter IV

"It is my desire that all my followers unite in a bond of unity, lest those who are without prevail against them." - Satan

Back
Top