Cutting The Cable

In Today’s Market You Can Cut The Cable Easily With The Open Capabilities Of The Internet. Which Is Replacing The Overpriced Cable And Satellite Subscriptions That Have Dominated The Market For Many Decades. There Are Many Digital Media Players Which Cost Very Little Money And Can Even Be Built From Scratch. Which Can Do A Lot More Than What Your Current Cable Or Satellite TV Provider Has To Offer.

There Are Many Examples Of Digital Media Players Some Are More Common Than Others. But Most Of These Common Devices Are Proprietary. Which Don’t Allow You To Tinker With The Hardware Or Software. But If You Do Than You’ll Void The Product Warranty And Won’t Be Able To Return It For A Full Refund If It’s Been Broken For Whatever Reason. Also Their Are Non Proprietary Digital Media Players Some Of Which Are Manufactured And Other Devices Require Some Do It Yourself Manufacturing. But With The Non Proprietary Devices You Can Fuck With Them One Way Or Another And Comes With No Product Warranties.

Digital Media Players (Proprietary)


Amazon Fire TV


Apple TV

Google Chromecast

Digital Media Players (Non Proprietary)

CuBox TV

Vero TV

There Aren’t Very Many Pre Manufactured Open Source Digital Media Players On The Market. The Majority Of Them Are Found On Auction Websites Like EBay Or Amazon Sold By People Who Are Mainly Computer Hobbyists Or Small Companies. Who Have Taken Ordinary Common Computing Devices And Turn Them Into Digital Media Players.

Do It Yourself

There’s Plenty Of Dedicated Open Source Media Streaming Software On The Internet, Some Of Which I’ll List Below And Is Currently Up To Date. From Their You Can Either Modify An Existing Computer To Run Any Media Streaming Software Or You Can Buy Yourself A Raspberry PI Computer Board For Roughly $35 American And Make Your Own Device.

openelecrasplex     xbian   osmc

All You Need To Do

Purchase A Raspberry PI 2 Model B With Either 512 MB Or 1 GB Of Memory From The Links Below Or Do A Web Search To Find Out If You Can Buy One In Your Area. Make Sure To Get The Proper Accessories In Order For The Raspberry PI To Be Fully Functional. This Includes An SD Card, Power Cord, Two USB WIFI Dongles, USB Keyboard/Mouse And A Case So That It’s Not Exposed To The Elements. This Can Be Purchased Separately Or In A Bundle From The Suppliers Listed Below.

Video Tutorials


VPNs: Which Ones Value Your Privacy?

vigilantcanuck: Is On The List For Being A Reliable VPN Provider

Originally posted on Privacy Blog:

Torrentfreak has published its annual survey of privacy-oriented VPN services, digging into each one’s technical, legal and business practices to see how seriously they take the business of protecting your privacy. The survey results may be seen (in great detail!) at

I was pleased to see Private Internet Access rated highly. It is the VPN I use and I wrote about it earlier at

View original

Pay As You Go VPN Service


Recently I Gave This VPN Provider A Spin To See How Stacks Up. First Of All It’s A Very User Friendly Company With Plenty Of Support If You Need It. Secondly The Prices Are Very Reasonable Costing You Anywhere From Two To Fifteen Dollars American Per Month With Plenty Of Payment Options Available. They Take All Major Cards (Visa, Mastercard), PayPal, PaySafe, WebMoney To Bitcoin Transfers And SMS And Fixed Tax Phone Call Options. Their Payment Plans Are Very Flexible So You Have The Option Of Paying For Just Three Days Of Access Up To Dedicated Servers With Full Support. Some Other Features Worth Mentioning: Non-Logging Chat Services (XMPP And Cryptocat), Their Own DNS Servers (Which Is A Good Option For Bypassing Regional Content Blocking), A SOCKS5 Proxy, An Anonymous Pastebin Clone And A Tor Exit Node.

Front End Software

Connecting To Servers Can Be Done A Number Of Different Ways. Some Options Are Easier To Use Than Others. The Easiest Option To Connect To There Servers Is A Program Called Safejumper. Which Is Available For All Major Operating Systems Including Linux. Other Front End Program Also Include OpenVPN, Tunnelblick And Viscosity.


‘Zero-Knowledge’ Privacy Means The Server Is Never Capable Of Viewing Plain Text Data; Therefore, The Data May Never Be Compromised Through Mismanagement, Prying Eyes, Or External Bodies Looking To Gain Access.

Zero Knowledge Privacy States That It Doesn’t Log User Activity Across Their Servers. However If Your Going To Be An Asshole And Use Their Services For Nefarious Criminal Purposes, Expect No Privacy Or Access To Services Even If You’ve Paid For It. Because To Them Bad Apples Will Ruin The Bunch And There Are Claims To Back Up That Policy.

Also They Say That They Bring Their Own Kernel To Each Deployed Server And That All Server Applications Run From The Random Access Memory, Which Is Erased Upon Every Power On Cycle.

There Are Also Other Functions That Exist To Safeguard The Privacy Of It’s Users, Which Is Transparency Reports. Which Identify Any Copyright Infringement Activity That Has Occurred On Their Services. In Which Case They Just Block Ports, Rather Than Hunting Down Individual Users Who Use To Download Copyrighted Protected Content. Blocking Ports Just Means It’s Harder To Access Their Servers Shortly After One Or More Port Has Been Deleted From Service. It’s A Form Of Collective Punishment. But Instead It Affects Everyone And Not One Individual In Particular.


Some Reviews Of Are Variable Some Peg The Speed To Be In A Range Of About 10-30 Mbps Sometimes It’s Peaks At 45 Mbps. But This Depends Primarily On Your Connect To The Internet Mainly What Kind Of ISP You Do Business With, What Country Your In Or Type Of Connect You Have. Whether It Be Cable, DSL, Dial Up, Satellite Or Mobile GSM (Aka Routing The Internet Through A Smartphone Or With A GSM Wifi Router)


The Times That I Did Try It Was Good For At Least Five Hours Of Causal Web Surfing. Then After It Would Slow Down Considerably And Usually If This Happens Then You Would Only Have To Manually Change Server Locations To Have It Return To Functional Speed. Download Speeds Were About The Same As My Causal Web Surfing Speeds With Brief And Periodic Moments Of Lag. But One Thing You Have To Remember It’s A Proxy Connection. Meaning The IP Address Changes Frequently To Avoid Network Detection, Hence Why You Might Encounter Periods Of Lag.

The Good

  • Plenty Of VPN Access Points Around The Globe
  • Accepts Many Payment Options, Including Bitcoin
  • Many Extra Features Such As XMPP, DNS, SOCKS5, TOR
  • Company Incorporated, Operates Off-Shore (Victoria, Seychelles)
  • VPN Software Available For All Modern Operating Systems
  • Decent Prices, Pay As You Go

The Bad

  • Notifies Users Of Upcoming Server Monitoring Is Likely A PR Stunt Meant To Highlight Their Full Transparency Policy
  • Employs Collective Punishments, Because Of Other Users Misconduct
  • Their VPN Software Doesn’t Work So Well With Windows, Works Pretty Well Mac OSX And Linux.
  • Do As I Say, Not As I Do

Encryption Is The Blood Of The Modern Internet As We Know It Today


Most If Not All Of The Encryption That’s Used Today Either Has Originated From Phil Zimmermann’s PGP Program Written In 1991 Or From The Free Open Source Impelmentation Forked From Phil Zimmerman’s PGP, Know As GnuPG.

Why I Wrote PGP

By Phillip Zimmerman

Part Of The Original 1991 PGP User’s Guide (Updated In 1999)

Whatever You Do Will Be Insignificant, But It Is Very Important That You Do It.

~ Mahamta Gandi


It’s Personal. It’s Private. And It’s No One’s Business But Yours. You May Be Planning A Political Campaign, Discussing Your Taxes, Or Having A Secret Romance. Or You May Be Communicating With A Political Dissident In A Repressive Country. Whatever It Is, You Don’t Want Your Private Electronic Mail (Email) Or Confidential Documents Read By Anyone Else. There’s Nothing Wrong With Asserting Your Privacy. Privacy Is As Apple-Pie As The Constitution.

The Right To Privacy Is Spread Implicitly Throughout The Bill Of Rights. But When The United States Constitution Was Framed, The Founding Fathers Saw No Need To Explicitly Spell Out The Right To A Private Conversation. That Would Have Been Silly. Two Hundred Years Ago, All Conversations Were Private. If Someone Else Was Within Earshot, You Could Just Go Out Behind The Barn And Have Your Conversation There. No One Could Listen In Without Your Knowledge. The Right To A Private Conversation Was A Natural Right, Not Just In A Philosophical Sense, But In A Law-Of-Physics Sense, Given The Technology Of The Time.

But With The Coming Of The Information Age, Starting With The Invention Of The Telephone, All That Has Changed. Now Most Of Our Conversations Are Conducted Electronically. This Allows Our Most Intimate Conversations To Be Exposed Without Our Knowledge. Cellular Phone Calls May Be Monitored By Anyone With A Radio. Electronic Mail, Sent Across The Internet, Is No More Secure Than Cellular Phone Calls. Email Is Rapidly Replacing Postal Mail, Becoming The Norm For Everyone, Not The Novelty It Was In The Past.

Until Recently, If The Government Wanted To Violate The Privacy Of Ordinary Citizens, They Had To Expend A Certain Amount Of Expense And Labour To Intercept And Steam Open And Read Paper Mail. Or They Had To Listen To And Possibly Transcribe Spoken Telephone Conversation, At Least Before Automatic Voice Recognition Technology Became Available. This Kind Of Labour Intensive Monitoring Was Not Practical On A Large Scale. It Was Only Done In Important Cases When It Seemed Worthwhile. This Is Like Catching One Fish At A Time, With A Hook And Line. Today, Email Can Be Routinely And Automatically Scanned For Interesting Keywords, On A Vast Scale, Without Detection. This Is Like Driftnet Fishing. And Exponential Growth In Computer Power Is Making The Same Thing Possible With Voice Traffic.

Perhaps You Think Your Email Is Legitimate Enough That Encryption Is Unwarranted. If You Really Are A Law-Abiding Citizen With Nothing To Hide, Then Why Don’t You Always Send Your Paper Mail On Postcards? Why Not Submit To Drug Testing On Demand? Why Require A Warrant For Police Searches Of Your House? Are You Trying To Hide Something? If You Hide Your Mail Inside Envelopes, Does That Mean You Must Be A Subversive Or A Drug Dealer, Or Maybe A Paranoid Nut? Do Law-Abiding Citizens Have Any Need To Encrypt Their Email?

What If Everyone Believed That Law-Abiding Citizens Should Use Postcards For Their Mail? If A Nonconformist Tried To Assert His Privacy By Using An Envelope For His Mail, It Would Draw Suspicion. Perhaps The Authorities Would Open His Mail To See What He’s Hiding. Fortunately, We Don’t Live In That Kind Of World, Because Everyone Protects Most Of Their Mail With Envelopes. So No One Draws Suspicion By Asserting Their Privacy With An Envelope. There’s Safety In Numbers. Analogously, It Would Be Nice If Everyone Routinely Used Encryption For All Their Email, Innocent Or Not, So That No One Drew Suspicion By Asserting Their Email Privacy With Encryption. Think Of It As A Form Of Solidarity.

Senate Bill 266, A 1991 Omnibus Anti Crime Bill, Had An Unsettling Measure Buried In It. If This Non-Binding Resolution Had Become Real Law, It Would Have Forced Manufacturers Of Secure Communications Equipment To Insert Special “Trap Doors” In Their Products, So That The Government Could Read Anyone’s Encrypted Messages. It Reads, “It Is The Sense Of Congress That Providers Of Electronic Communications Services And Manufacturers Of Electronic Communications Service Equipment Shall Ensure That Communications Systems Permit The Government To Obtain The Plain Text Contents Of Voice, Data, And Other Communications When Appropriately Authorized By Law.” It Was This Bill That Led Me To Publish PGP Electronically For Free That Year, Shortly Before The Measure Was Defeated After Vigorous Protest By Civil Libertarians And Industry Groups.

The 1994 Communications Assistance For Law Enforcement Act (CALEA) Mandated That Phone Companies Install Remote Wiretapping Ports Into Their Central Office Digital Switches, Creating A New Technology Infrastructure For “Point-And-Click” Wiretapping, So That Federal Agents No Longer Have To Go Out And Attach Alligator Clips To Phone Lines. Now They Will Be Able To Sit In Their Headquarters In Washington And Listen In On Your Phone Calls. Of Course, The Law Still Requires A Court Order For A Wiretap. But While Technology Infrastructures Can Persist For Generations, Laws And Policies Can Change Overnight. Once A Communications Infrastructure Optimized For Surveillance Becomes Entrenched, A Shift In Political Conditions May Lead To Abuse Of This New-Found Power. Political Conditions May Shift With The Election Of A New Government, Or Perhaps More Abruptly From The Bombing Of A Federal Building.

A Year After The CALEA Passed, The FBI Disclosed Plans To Require The Phone Companies To Build Into Their Infrastructure The Capacity To Simultaneously Wiretap 1 Percent Of All Phone Calls In All Major U.S. Cities. This Would Represent More Than A Thousandfold Increase Over Previous Levels In The Number Of Phones That Could Be Wiretapped. In Previous Years, There Were Only About A Thousand Court-Ordered Wiretaps In The United States Per Year, At The Federal, State, And Local Levels Combined. It’s Hard To See How The Government Could Even Employ Enough Judges To Sign Enough Wiretap Orders To Wiretap 1 Percent Of All Our Phone Calls, Much Less Hire Enough Federal Agents To Sit And Listen To All That Traffic In Real Time. The Only Plausible Way Of Processing That Amount Of Traffic Is A Massive Orwellian Application Of Automated Voice Recognition Technology To Sift Through It All, Searching For Interesting Keywords Or Searching For A Particular Speaker’s Voice. If The Government Doesn’t Find The Target In The First 1 Percent Sample, The Wiretaps Can Be Shifted Over To A Different 1 Percent Until The Target Is Found, Or Until Everyone’s Phone Line Has Been Checked For Subversive Traffic. The FBI Said They Need This Capacity To Plan For The Future. This Plan Sparked Such Outrage That It Was Defeated In Congress. But The Mere Fact That The FBI Even Asked For These Broad Powers Is Revealing Of Their Agenda.

Advances In Technology Will Not Permit The Maintenance Of The Status Quo, As Far As Privacy Is Concerned. The Status Quo Is Unstable. If We Do Nothing, New Technologies Will Give The Government New Automatic Surveillance Capabilities That Stalin Could Never Have Dreamed Of. The Only Way To Hold The Line On Privacy In The Information Age Is Strong Cryptography.

You Don’t Have To Distrust The Government To Want To Use Cryptography. Your Business Can Be Wiretapped By Business Rivals, Organized Crime, Or Foreign Governments. Several Foreign Governments, For Example, Admit To Using Their Signals Intelligence Against Companies From Other Countries To Give Their Own Corporations A Competitive Edge. Ironically, The United States Government’s Restrictions On Cryptography In The 1990’s Have Weakened U.S. Corporate Defenses Against Foreign Intelligence And Organized Crime.

The Government Knows What A Pivotal Rrole Cryptography Is Destined To Play In The Power Relationship With Its People. In April 1993, The Clinton Administration Unveiled A Hold New Encryption Policy Initiative, Which Had Been Under Development At The National Security Agency (NSA) Since The Start Of The Bush Administration. The Centerpiece Of This Initiative Was A Government-Built Encryption Device, Called The Clipper Chip, Containing A New Classified NSA Encryption Algorithm. The Government Tried To Encourage Private Industry To Design It Into All Their Secure Communication Products, Such As Secure Phones, Secure Faxes, And So On. AT&T Put Clipper Into Its Secure Voice Products. The Catch: At The Time Of Manufacture, Each Clipper chip Is Loaded With Its Own Unique Key, And The Government Gets To Keep A Copy, Placed In Escrow. Not To Worry, Though–The Government Promises That They Will Use These Keys To Read Your Traffic Only “When Duly Authorized By Law.” Of Course, To Make Clipper Completely Effective, The Next Logical Step Would Be To Outlaw Other Forms Of Cryptography.

The Government Initially Claimed That Using Clipper Would Be Voluntary, That No One Would Be Forced To Use It Instead Of Other Types Of Cryptography. But The Public Reaction Against The Clipper Chip Was Strong, Stronger Than The Government Anticipated. The Computer Industry Monolithically Proclaimed Its Opposition To Using Clipper. FBI Director Louis Freeh Responded To A Question In A Press Conference In 1994 By Saying That If Clipper Failed To Gain Public Support, And FBI Wiretaps Were Shut Out By Non-Government-Controlled Cryptography, His Office Would Have No Choice But To Seek Legislative Relief. Later, In The Aftermath Of The Oklahoma City Tragedy, Mr. Freeh Testified Before The Senate Judiciary Committee That Public Availability Of Strong Cryptography Must Be Curtailed By The Government Although No One Had Suggested That Cryptography Was Used By The Bombers.

The Government Has A Track Record That Does Not Inspire Confidence That They Will Never Abuse Our Civil Liberties. The FBI’s COINTELPRO Program Targeted Groups That Opposed Government Policies. They Spied On The Antiwar Movement And The Civil Rights Movement. They Wiretapped The Phone Of Martin Luther King. Nixon Had His Enemies List. Then There Was The Watergate Mess. More Recently, Congress Has Either Attempted To Or Succeeded In Passing Laws Curtailing Our Civil Liberties On The Internet. Some Elements Of The Clinton White House Collected Confidential FBI Files On Republican Civil Servants, Conceivably For Political Exploitation. And Some Overzealous Prosecutors Have Shown A Willingness To Go To The Ends Of The Earth In Pursuit Of Exposing Sexual Indiscretions Of Political Enemies. At No Time In The Past Century Has Public Distrust Of The Government Been So Broadly Distributed Across The Political Spectrum, As It Is Today.

Throughout The 1990s, I Figured That If We Want To Resist This Unsettling Trend In The Government To Outlaw Cryptography, One Measure We Can Apply Is To Use Cryptography As Much As We Can Now While It’s Still Legal. When Use Of Strong Cryptography Becomes Popular, It’s Harder For The Government To Criminalize It. Therefore, Using PGP Is Good For Preserving Democracy. If Privacy Is Outlawed, Only Outlaws Will Have Privacy.

It Appears That The Deployment Of PGP Must Have Worked, Along With Years Of Steady Public Outcry And Industry Pressure To Relax The Export Controls. In The Closing Months Of 1999, The Clinton Administration Announced A Radical Shift In Export Policy For Crypto Technology. They Essentially Threw Out The Whole Export Control Regime. Now, We Are Finally Able To Export Strong Cryptography, With No Upper Limits On Strength. It Has Been A Long Struggle, But We Have Finally Won, At Least On The Export Control Front In The US. Now We Must Continue Our Efforts To Deploy Strong Crypto, To Blunt The Effects Increasing Surveillance Efforts On The Internet By Various Governments. And We Still Need To Entrench Our Right To Use It Domestically Over The Objections Of The FBI.

PGP Empowers People To Take Their Privacy Into Their Own Hands. There Has Been A Growing Social Need For It. That’s Why I Wrote It.

Philip R. Zimmermann
Boulder, Colorado
June 1991 (updated 1999)

Please Consider Donating To GnuPG Project So That Future Generations Of Internet Users Can Enjoy The Benefits Of Online Privacy Without Interception Or Interference.

VPN + Tor + WRT = Better User Security And Less Intrusions Of Privacy

vpn + tor

It’s Looks Complicated But It’s Really Not That Hard Considering The Numerous Amounts Of Tutorials On The Net These Days When It Comes Setting Up A VPN Network On Your PC, Tablet Or Smartphone. In Which Case I Will Provide Links Below For Windows, OSX And Linux Users On How To Do That. As For Tor, There’s A Number Of Options Available To Connect The Network The First Method Is The Tor Browser Bundle. However I Don’t Recommend Using That Method, Seeing As The Program Files Are Stored On A Hard Drive. Which Can Leave Digital Fingerprints Behind, Even After The Program Files Are Deleted. The Second Method That I Personally Like To Use Is The Tails Incognito Linux Live Distribution That Only Runs Exclusively On The Ram Disk. Which Will Wipe Any Trace Of Your Activity Soon After You Restart Or Turn Off Your Computer. The Third Method Which Works Well With Android Modeled Tablet’s And Smartphones, Not Apple IPhones Or Windows Smartphones. For The Best Results Of Using Tor On Android Tablet’s Or Smartphones Is To First Root Both Devices (That’s If You Own Two Devices). Then The Next Step After Rooting Is To Flash Custom Firmware To Your Device(s). Keep In Mind That When You Do This, It Automatically Voids The Warranty On Your Device(s).

Now Lets Throw In The VPN, Tor And WRT Tutorial Links To Make Your Web Browsing Experience Slightly Less Intrusive. Although The NSA Or Other Alphabet Intelligence Agencies Are Currently Trying Or Have Broken Some VPN’s Services Currently On The Open Market. So Make Sure To Do Your Research First Before You Start Signing Up For VPN Services.

Connecting Windows & Mac OSX To The Tor Network

Connecting Debian Linux Based Distributions To The Tor Network

Connecting Red Hat & Suse Linux Based Distributions To The Tor Network

Connecting Android To The Tor Network

Downloading, Burning & Using Tails Amnesic Incognito Live System


 Installing & Using A VPN On Windows & Mac OSX

Installing & Using A VPN On Linux Or BSD

This Might Get A Little Tricky When Trying To Use Tails Linux And Connecting To A VPN At The Same Time. Which Is Next To Impossible According To The Searches I’ve Done With Regards To Tails And VPN’s. It Seems That The Development Team Discourages The Pratice, Seeing As It May Pose As A Massive Security Issue During The Live Session. You Can Try Working Around It, But Just Remember That You Might Become A Bigger Target To Watchful Eyes.

There Is However Another Option To Consider If You Want To Use Tails Linux And A VPN At The Same Time. This Means Flashing Your Current Or New Wifi Router With Either DD-WRT, OpenWRT Or LibreWRT Firmware. Then Configuring The Flashed Router With A VPN (Links On How To Do This Will Be Posted Below). This Provides You With An Encrypted Router, The Privacy Of A VPN And To Top It Off With The Anonymity Of The Tor Network. This Can Be Also Be Used With The Tor Browser Bundle And Your Rooted Custom Firmware Android Tablet Or Smartphone With Orbot Installed. As Long As Your Connect To The Flashed And Encrypted Wifi Router Within Your Own Home.

Save, Create And Run Your Own Pirate Bay


Back In December 2014 The Pirate Bay Was Forced To Permanently Shut Down It’s Operations Due To A Heavy Handed Police Raid On Their Central Servers In Stockholm, Sweden. Since The Raid Plans Were Devised To Bring Back The Pirate Bay. However The Comeback Would Be Focused On A Decentralized Network Of Pirate Bay Clones. Rather Than A Centralized Operation As It Was Before, Which Made It More Susceptible To Regal (Ahem Legal) Action Mainly From The Likes Of The MPAA And RIAA.


Instead Of Having Centralized Servers That Can Be Located And Shutdown At The Whim Of The Authoritarian State. The TPB Crew Took It Upon Themselves To Launch The Pirate Bay Source Code And Made It Open Source In The Hopes That Some Tech Savvy Individuals Would Carry On The Pirate Bay Tradition. It’s Similar To A Post I Published A Few Weeks Ago About Hosting Your Own Private Cloud Server. Which The Control Of Information Remains In The Hands Of The Individual Users And Not At The Whim Of Some Large Corporations Or Self Serving Government Entities.

The Answer Is Open Source

The Open Bay



Linux Distributions For Beginners

Whenever You Decide To Switch Over To Linux At Some Point. Just Remember That Ubuntu And It’s Clone Distributions Are Very Unsecure And Contains Malware, Spyware & Software Backdoors.

There Are Many Linux Distributions For Beginners Out There On The Open Internet But In This Case I’ve Narrowed Down Some Reasonable Easy To Use Distributions. For People Who Want To Transition From Windows 8.1 Or OSX Yosemite And For Those Who Want General Purpose Computing But Don’t Have The Financial Resources To Afford It (Aka Students Etc).

korora linuxrobolinux