///// PRACTICAL EXERCISE HAS ENDED — STAY TUNED FOR DETAILS ON THE NEXT ONE /////

The Situation

Due to the increased tempo in attacks on free speech around the world, we’re reviving the RFR Dark Net project.  In short, we’re dusting off some privacy and anonymity tools that allows us to communicate with each other and share news and information, even if someone else doesn’t want you to.

Multiple countries are taking active measures to prevent the use of social media platforms, websites, and secure communications application, with renewed calls for banning X, Telegram, Signal, Whatsapp, and others.  Besides historically oppressive regimes such as Cuba, Iran, China, Venezuela, Russia, and many others, now even western government officials are working to suppress “misinformation” in the UK, Denmark, and elsewhere.  Specifically, they are now calling for outright bans on certain social media platforms, and end-to-end encryption, such as Signal and Telegram.

The Assessment

The trend that we are seeing in other parts of the world is certain to come further to the west, especially if the deep state can pull off the next stage of their coup and place another Marxist globalist in the White House in 2024.  It is likely the “regime” (2.0) will aggressively persecute any narrative that goes against their goals. It would be prudent to take proactive measures and build in the infrastructure and tools, and disseminate these tools across the patriot community now, before heavy-handed policies are fabricated, and enforced against, free speech.

 

The Practical Exercise

The alternate RFR Dark Net website will be hosted on TOR throughout the week of September 1st, beginning at Noon (Pacific) on Monday, and will remain up through at least Friday evening.

  • You will need to download TOR  (it’s free, open source, and cross-platform)
  • You will need to download Bitmessage (it is also free, and multiple-platform)

LINUX USERS:  If you don’t have Linux built with the AmRRON Corps Pi Build script, the best and simplest way is to click on the link (below).  It will automatically start downloading:

PyBitmessage-0.6.3.2.glibc2.15-x86_64.AppImage  16-Jan-2023 11:53            26334400

Once downloaded, find it in your Downloads folder and RIGHT click on it.  Select ‘Permissions’ tab, and check the box allowing it to run as a program.

That’s it!  You should be able to run Bitmessage by clicking it after that.

 

After you set up Bitmessage and create an identity (Regenerative Deterministic Address from the Bitmessage File tab — save the password and settings that you choose!), add the channel:

Name:  RFR Dark Net

Address:  BM-2cU8THDSdT6XS2LN6uiV4BtWjF66kEs5c2

This will allow you to read messages posted by me (JJS).  JJSs Primary Bitmessage address is:  BM-2cW6Z2vge8YvaCXbSSGxEBriXXgx6VFsGn

Add the JJS Bitmessage address to your contacts so you’ll recognize postings by me in the RFR Dark Net channel.  All other users will appear as anonymous unless they identify themselves.  Then you can add them as contacts and label their address for recognizing them in the future.

The Bitmessage RFR Dark Net channel is where we will post the TOR URL (.onion website address) so you can navigate to it using TOR while the website is actively being hosted.  Each time we start a new hosting session, a new .onion URL is generated (it is not static).  So if we become disconnected from the internet for any reason, and have to reconnect, it will generate a new website URL.  The RFR Dark Net channel is how we can let you know where to find us on TOR.

ONE-TIME CHEAT/HELP:  Since this is the first RFR Dark Net hosting in a long time, we realize some may have TOR downloaded, but not Bitmessage.  Or maybe you don’t have your Bitmessage configured yet.  For this week’s practical exercise only, we’re providing the TOR website address here:

http://rxgnviheyzt7eqgm4bnm5qlefdav2c3mmplmb6kq2rqqjpjvsuve5did.onion   ( <– copy/paste into TOR browser)

What’s on the RFR Dark Net website?

  • Demonstration of the type of content and layout we might use if our website were taken down, hacked, or otherwise became non accessible over normal internet.
  • Audio Message (short introduction to the RFR Dark Net site).  This is where short audio messages could be posted in the future.
  • Start Here page.  By clicking on the ‘Start Here’ button, you will be taken to an introductory page.  This is also where the latest live links will be posted to take you to active .onion web pages for:
    • RFR Dark Net secure/anonymous chat
    • Drop site (for sending messages or files to RFR)
    • Other addresses such as onionmail, bitmessage, etc., when active
  • Articles (at the bottom of the main page)
  • Resources tab (valuable resources for tracking information and intelligence in disasters or other emergencies; situational awareness.  If you have resources you’d like to see added, send them along!
  • PGP Encryption tab (a page introducing you to the setup and use of Kleopatra for encryption and digitally signing files and documents, as well as an introduction to PTE and PFE (Paranoia Text Encryption and Paranoia File Encryption)
  • AmRRON Reloaded tab (jump-off page to visit the AmRRON Reloaded alternate TOR website for communications related messages, resources, and coordination.
  • MUCH MORE can (and will) be added to these sites, and we can make changes during a non-permissive situation, or otherwise when our normal website might not be accessible.

PODCAST RESOURCES

In this week’s podcast, ‘Darknet tools and Exercise‘, (a one-segment podcast), I discussed this week’s practical exercise and mentioned some resources.

I recommend the two postings and podcasts from the 2021 Security Series, which covered TOR and Bitmessage, including tutorial videos and links, at:

TOR Browser – Install and Guidance for Use

and…

2021 SECURITY SERIES (PART 10) — Bitmessage & qTOX Secure Messaging Apps

In some restrictive countries we have seen access to TOR blocked.  The developers have created ‘TOR Bridges‘, which allow users in non permissive environments to access TOR through a normal internet connection, which then “bridges” over to TOR to enter the TOR network.  Learn more at: http://bridges-test.torproject.org/