Episode 16-13 Highlights & Resources
- Visit Radio Free Redoubt at PODBEAN to DOWNLOAD this and previous shows!
- Radio Free Redoubt Now available on iTunes!
Thank you!! For your prayers, letters of encouragement & financial support. Your donations help keep the mission of Radio Free Redoubt moving forward. Please consider visiting our DONATE PAGE.
EVENTS:
—>>Spokane County Constitutional Republicans Event- JJS Guest Speaker!
NW Preparedness Expo May 7th, 2016 in Prosser, Washington
T-REX 2016 June 10th-12th!! [Promo Video]
SHTF Intelligence Training by Samuel Culper!
Liberty Tree Expo 2016- Yakima. June 17th-19th
God & Country 22nd Annual Celebration June 24th-26th
NEWS, COMMENTARY & RESOURCE LINKS:
Taliban splinter group claims attack on Christians: 60 dead
Obama: Forget The Difference Between Capitalism And Communism
Easter Egg hunt rampage
Chased- The Underground Church [Video]
Chinese Police Proudly Record Their Torture of Christians
http://www.netstumbler.com/downloads/
https://www.vistumbler.net/
iStumbler or MacStumbler or good versions of Netstumbler for the Apple Mac.
Will you post links to youtube videos on making long range wifi antennae receivers?
Another option for a long-range wifi antenna is the Pringles can antenna, lots of easy to find articles for making them for next to nothing out there
Was also glad to hear you bring up VPN which can be used, assuming it is a non or minimal logging VPN, to hide you entrance to TOR
Install Orbot and a software that calls home every once in a while, maybe something like dyndns or a standard backdoor. Put the phone near the wifi AP of choice via car, person, even unknowing couriers. The phone pings back its current wifi network and you should be able to connect to it. The phone will work provided the courier stays in range or the battery is alive.
So if the principle is using his phone to connect to the courier it should look like this.
principle/intermediary –> courier –> tor –> target
If someone is getting busted for using tor, its the courier. So you can use unknowning couriers. Much like the drug smugglers do with a key of coke; you can pop a phone under someone’s fender/bumper.
This is essentially adding a physical bounce to the tor network.
Two concerns may be had here
Firstly, scrub and mac change every time. You can track macs, broadcasts, devices looking for old contacts, etc
Secondly, unknowing couriers may be stopped or may leave at in-opportune times. Just the nature of things.
@df
vpn –> tor = prison
tor –> vpn = safe
Tor provides you anonymity, the vpn gives you privacy. If the vpn host gets raided, they will hand it over to the police. 20 dollars in btc doesn’t buy loyalty. So if the vpn rolls on you and you’re connecting to the vpn through tor, they still don’t know where you’re connecting from. If you’re connecting to tor from the vpn, and the vpn rolls on you, they know your IP, thus you get “IRL b&”.
[…] Click here for Pt2 […]
[…] Click here for Pt2 […]
[…] https://radiofreeredoubt.com/2016/03/28/episode-16-13-going-underground-part-2/ […]