After learning more about the scope and breadth of dragnet automated surveillance activities by government and non-governmental entities which we have covered on this blog in articles such as DROPOUT JEEP Your Phone is Their Phone, and If it is Electronic it is Intercepted and Stored I have become motivated to share my energy and expertise. I believe I may have found out a way to volunteer my unique technical experience to the Liberty movement in general and the American Redoubt objective in particular (other they my daily musing and balmy personality). I am an “IT” guy by trade.
Because I believe in the Liberty movement, the American Redoubt cause including a man’s God-given right to speak privately and freely (associate) as well as the U.S. Constitution I will begin to host a series of articles here to help you upgrade your computer security. The goal of the project is to teach you how to be more secure, and much more importantly as anonymous as possible while using the Internet. The focus will be on anonymity, not necessarily security. There is not a lock that has been invented that cannot be picked. However you can communicate as securely and anonymously as possible. Hopefully this will eventually cumulate into something I am going to call the American Redoubt Darknet (ARD). This is obviously an expansion of John Jacob Schmidt over at Radio Free Redoubt American Redoubt Radio Operators Network (AmRRON) and the American Redoubt Network (ARN).
As JJS says the American Redoubt Network (ARN) consist of all people who support the American Redoubt movement. The American Redoubt are people who live in, or are moving to the American Redoubt for multiple reasons including political reasons. Everyone, in the ARN should be able to help out in whatever way they can to support other Redoubters in good times and bad. The AmRRON is a network of HAM, CCB and MERS radio operators who are training to help God-fearing Liberty individuals in time of crisis with wireless radio communications.
I envision the American Redoubt Darknet (AmRD or ARD I have not decided) operators will be guys like me who know a thing or two about computers, IP networks and computer programming and want to volunteer our time and resources in allowing Redoubters to communicate more anonymously. In general this will be in setting up anonymous (and as secure as possible) AR resources on darknets such as The Onion Router and the Internet Invisibility Project to allow for email, chat and file transfer. With the Lord’s help we will build systems that can help Liberty groups and individuals in time of crisis with computer and network communications which are as secure and anonymous as possible. Simply put the AmRD operators are the American Redoubt computer network guys. We will help Redoubters communicate more securely and anonymously with each other in good times and in crisis. What I believe will be interesting for the AR computer guys to do is to help build, expand and secure anonymous IP communications now, so that in the future we may be able to leverage these in times of crisis.
But Bard, the grid will be down we will not have network of computers. Yes, I agree, if we have a complete grid-down situation what we are building will not be useful at that particular time. However there is something to think about. One, the grid is not down now. And second, there is no guarantee that the grid will “completely collapse” as in a solar flare, EMP or coordinated attacks across the nation. Like semi-functioning countries such as Mexico the grid may come up and down, be up in some places be down in others. And on the other side of an event, there may be a “rebuilding phase” where the grid and computer networks are coming back on. No matter if is now, a semi-functioning grid or during a rebuilding phase it may be very useful for as many people as possible, to already know how to use computer networks as securely and anonymously as possible. One other thing BTW, you can use computer networks through HAM radios. We can call an anonymous and secure as possible network of computers a “darknet.”
“A darknet is anonymizing network where connections are made only between trusted peers (or friends in this case redoubters) using non-standard protocols and ports.” The primary purpose of the darknet is to make communications anonymous, not necessarily secure. This is critical for you to understand, the objective is anonymity, not necessarily security. Basically we will implement technology and show you how to implement technology to allow various forms of communications between interested parties and make it very hard, if not impossible for people to prove beyond a reasonable doubt “you were the one communicating.” That is anonymity. The core objective is to let people talk to each other, perhaps not in a secure method, but in a method that leaves very little finger prints of who was actually talking.
Why not focus on security Bard? It is my opinion that it is very hard, if not impossible to secure communications from the “…larger adversaries…” which are in transit. You can make them work for it, but you should not trust electronic security, what we call communications security (COMSEC) to any program. At the same time I believe for a similar level of work, it may be more achievable to make your interactions on the Internet very hard to track. To use a fantasy cultural reference Think of the Lord of the Ring. Once the eye of sauron is focused on you, it is nearly impossible to shake, but it may be possible to avoid the eye of sauron gaze and sneak through mordor. That is what the Hobbits did, they were able to sneak through, because the eye of sauron cannot be everywhere all the time. Of course that means you don’t “beat drums and walk around in loud colors while trying to sneak pass the eye of sauron in evil mordor. That is what you are doing now electronically. Electronically each and everyone of you are beating drums, putting up signs saying “…I am a Christian, Liberty loving patriot, look at me.” That is not good for avoiding the gaze of sauron. Focusing on anonymity which may be achievable rather than security, which may not be achievable thus makes more sense. More bang for the buck. However we will touch on security, and include security. If there is someone out there who wants to focus on security ideas (mostly around PGP or the OpenPGP now called GnuPG project I would assume) please volunteer.
There are many reasons you may want to use the web, or communicate with each other anonymously. The basic reason I am going to spend a lot of time helping you is that you should be “secure” in your effects. I believe in every man’s God-given right to private and secure communications and the Fourth amendment to the constitution
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”
The Catholic church teaches that individuals have the right to voluntarily associate. “Subsidiarity assumes that these human persons are by their nature social beings, and emphasizes the importance of small and intermediate-sized communities or institutions, like the family, the church, labor unions and other voluntary associations, as mediating structures which empower individual action and link the individual to society as a whole.”
Thus I believe first it my God-given moral right as expressed through my Christian faith, and also it is my Constitutional right to freely associate and thus communicate with others. To freely associate would imply a certain degree of privacy as I may not associate or communicate with you if every thing we said or did was recorded, analyzed and permanently kept. That is an evil called self-censorship. And that is the goal of the eye of sauron, control, fear and self-censorship. These are the motivations of the Devil.
There are many entities; governmental and non-governmental who believe you only have the right to communicate, if they can listen to your conversation. I disagree with this. I do not believe you have the ability to make yourself completely anonymous or secure to an entity with world-wide computer network reach. However you can make your communications very secure and as anonymous as possible to all entities including those with less of a global reach. You can stop beating drums and yelling “look at me evil eye.” You can put on some “goblin armor and sneak around at night.” That is the objective of the AmRD, to help you make your communications as securely and anonymously as possible and specifically focused to support the Liberty movement and the American Redoubt objectives.

Legal disclaimer. As I explain means and methods to increase your anonymity, I want to be clear I do not condone the use of any information or products I provide for anything illegal. Also if it doesn’t work, don’t come yelling at me. I am freely sharing with you my opinion, not advice.
Please let me know what you think of the ARD / AmRD project. What can we do better, ideas on security, and ways we can leverage existing tools to help increase security and anonymity. Next part only for guys who know. If you are a computer or networking professional supportive of the American Redoubt objectives and would like to assist in the AmRD project contact me. Right now I think we are looking for PHP , Java and Python developers. Also developers who are interested in learning the protocols I2NP, I2CP, SSU among others. We need Linux system administrators, and those who can help out with the user community on services such as IRC. If you have significant skills you may want to contact me anonymously with a disposable email account. They know who I am. I do not need to know who you are, just that you are willing to help. My email is alex (at) alexanderbarron dot com not blueeyes@abcisp.com.
This site has been attacked by tyrannical foreign governments, Obama-era federal agencies, candidates for governor, and multiple progressive outlets. Progressives seem to hate any black conservative who walks off the liberal “woke” plantation. Social Media Internet ghettos have greatly diminished distribution of our content. This is called “Shadow-banning.” Please take a moment and consider sharing this article with your friends and family. Also please support our ability to continue to bring you a different perspective. Donate here. Another way to support us and show your spirit is to purchase CCS Partisan merchandise. Thank you.

I have been running a .onion site for a few years…
Working on a turnkey project along these lines.
There is already an existing server suite.
Impressed with the audience here.
Hope to catch you there!
I’ve been running a site along these lines for some time.
A turnkey project is already in the works.
This is quite an audience – I’m very impressed.
Pingback: Amatuer Radio Operators Report from Murrieta, California : AMRRON
Pingback: Report from on the ground in Murrieta, California | Charles Carroll Society
AmRD is a great idea. The peer to peer nature of I2P would makes it especially suited to use in a partial grid down or possibly a total grid down scenario. How could it possibly work in a total grid down scenario? If email can be sent over shortwave why not IP packets ? Even in that situation local infrastructure is likely to exist, distance communications would be the problem, something shortwave is good at. ( disclaimer: I am not a HAM operator ) We used to use dial-up lines and modems to get in the net so I know it should be possible. Maybe a project to get started if it doesn’t already exist.
I’ve been playing with I2P, Susimail, and I2P-Bote for the last few days and have installed it on 3 different machines (all linux), installation went smoothly, no problems; the first day though connectivity was spotty at best. On my home network ( 2 machines installed) I opened the TCP and UDP ports as suggested and installed I2P-Bote. I was able to install and run it with no problems. Susimail was more of a problem, I could not get to the eepsite (I2P websites) to create an account and the SMTP and POP3 proxies were reachable ( localhost:7659 for SMTP, localhost:7660 for POP3 ). Additionally I was not reliably able to get to any of the eepsites. After checking the forums I downgraded to the previous version and had a bit more success but nothing I would want to use for any period of time.
Day 2 I tried running I2P on Tails and had much more success. I was able to get to everything, created a few Susimail accounts, and setup I2P-Bote and send a few messages. I noticed the version on Tails was 0.9.9 so I installed it on the desktop instead of running it in a virtual machine. All working. Home machines are on net as well with no version change (using 0.9.11) so my conclusion is there was perhaps some type of network impairment ? I don’t really know but will continue to use daily to see if this is a regular thing or I just had a bad day.
Some observations regarding mail:
Susimail is very easy to use and setting up an account is a snap. Performance is comparable to usual webmail type systems. User interface is a bit simplistic but it gets the job done. I did try to get Mailvelope to work with it but had no luck. It appears that if you want encryption of the email body you will have to encrypt outside and paste the encrypted text in or use an email client via the proxies provided by I2P ( Thunderbird, etc…) with the encryption plugin of your choice. You can send and receive email form non I2P accounts. the most serious drawback I saw was this is a traditional client/server type system and there is only one server providing this service. Your mail is stored on it in whole until you receive it and if the server goes away, that’s it. Single point of failure.
I2P-Bote also provides a web based interface but the similarities end there. It is a peer to peer based system that encrypts messages end to end and routes the mail over multiple tunnels, optionally delaying between hops to break up traffic patterns. Delivery is slower. due to the peer to peer nature and delays between hops, A test message I sent to my self took 2 hours to receive. If you need to get a message to someone in a hurry this is not the tool to use. Another drawback is the addressing, the addresses are a cryptographic hash, not too user friendly for the non-technical and not easy to give to someone else. This is a known issue and the development team is working on something to take care of it.
It would be really great to have the best of both worlds. Using existing email clients and encryption capabilities with the peer to peer delivery capability of I2P-Bote – I feel a project coming on……
One thing that would need to be done is to maintain a mirror and development tree if I2P were used for AmRD incase some unknown three letter agency decides it needs to go away…
just my $0.02
Thanks very much for posting this! I’ve messed with susimail for some time now with success, but I’ve also been concerned over the “single point of failure” problem. I have not tried I2P-Bote. How do you access it via Tails?
If you have some time to spare and are so inclined, take a look at Freenet. https://freenetproject.org/download.html
I’d be curious to hear what you have to say about it.
Had a look at their about page, but did not look too much further yet. I like their “darknet” concept. It would reduce the possibility of somebody standing up nodes with the specific purpose of joining the network to monitor and/or disrupt communications. The data storage aspect of it also is interesting, but i would be reluctant to use it outside of “darknet” mode, encrypted or not, i would not want data related to my plans, operations, pictures of my cat, etc… residing on machines owned by some hostile entity. I will definitely be taking a harder look at it. Thanks for the info.
To access I2P-Bote via Tails you have to start I2P and go to the plugins eepsite, get the url, and then install it into the I2P router. There are several problems with this.
1. You are going to have to do this every time you start up Tails.
2. The crypto identity used as your address in the I2P-Bote system is going to change every time. So nobody can reach you unless you contact then first and send your contact info, each time..
These issues can be overcome by doing a USB stick install with encrypted storage on the USB stick. Then you could install it once and maintain the same address. Of course then you have other issues to contend with……
I do not think that is true. i2p now comes with i2p installed. “I2P[http://www.i2p2.de] has been included since Tails v0.7 with Iceweasel preconfigured using FoxyProxy so that eepsites (.i2p TLD) are directed to I2P. All other traffic gets routed through Tor.” https://tails.boum.org/contribute/design/I2P/
I2P is not started by default in Tails, but can be started manually throught the menu:
Applications -> Internet -> I2P more here: https://tails.boum.org/doc/anonymous_internet/i2p/index.en.html
How to get on The Market Place on i2p.
STEP 2. When you first log in to TAILS it’ll automatically open the iceweasel browser and
begin connecting to the TOR network. You can close iceweasel as TOR isn’t used for accessing sites on the i2p network.
Then from the Applications menu on the top-left corner, go to Internet > and select i2p .
This will start the application and bring up the i2p router console.
At this point I would advise immediately disabling javascript via the NoScript extension .
JS is a possible security risk and TheMarketplace has been designed to function fully without it.
Now it’ll take a little time (5-10 mins) for i2p to find peers and to become integrated with the network,
so go take a dump, make a coffee or check how much much that stash of bitcoins is worth today. 😉
http://www.reddit.com/r/themarketplace/comments/1rzqhy/a_howto_guide_to_accessing_themarketplace/
Sorry if my post was unclear. I was referring specifically to I2P-Bote, not I2P directly. You are absolutely correct that I2P IS included in Tails, it’s the I2P-Bote plugin that would have to be installed each time….. hope that clears things up…..
I think we all need to become more comfortable with the concept of security by obscurity and a diy attitude.
For my grandmother, letting a restaurant cook her a meal even once a week was unthinkable. This generation rarely consumes a meal that was cooked at home and even less frequently from raw ingredients.
The same attitude exists with regard to technology. Designing and printing circuits is a huge undertaking, but writing code from scratch on a standalone 486 running a bare minimum Linux install has potential. Keys, pads, and methodology could not be public, and first transmission would require sneaker net. Subsequent transmissions encrypted and sent from public access points.
Of course this only makes sense if you have secrets worth keeping. I have a big mouth and trouble telling lies, so I avoid secrets now like the plague.
You may not have secrets now, but as CT and NY just showed us, what is legal today, may be illegal tomorrow. Also everyone who uses darknet technology help provide “static” for those who need to use it to live. However the protests or “troubles” against this regime take shape, I am sure that communicating will be key. We will need it, and they will try and prevent it.
Yikes! http://gizmodo.com/the-fbi-seized-all-of-tormails-data-and-is-using-it-to-1509838202
Thanks a lot Bishop. It is 1130 at night and Now I have to modify tomorrow’s post! No in truth, thank you. This is just depressing. But it ok. Instead of executing a search warrant for the data they wanted they had to hack the system. This demonstrates that the TOR system is safer than Google email, not as safe as I2P. Man-oh-man.
It’s back to sneaker net !
Funny side story… My kids are learning sign language at a local church’s homeschool outreach and have been enjoying their own secret code at home. My two oldest are making up their own words to use with each other. I haven’t suggested it, but I suppose they have become paranoid after watching “NSA is coming to town” Christmas song spoof (which they now prefer over the traditional tune)
Learning more than one method of communication is key. My kids are learning Latin. However learning how to communicate over a distance is also key. The last time this thing kicked off it was a couple of lanterns in a tall Church and a bunch of riders. The darknet is not the “ultimate solution” it is just one more tool in the tool box.
Suggested reading. http://simonsingh.net/books/the-code-book/
Even w a supercomputer parsing all possible publications it still has to run all possible algorithms (infinite possibilities) against each of these documents. Can’t be done without knowing or guessing the algorithm.
Back in the day I ran a couple of Freenet sites. The decentralized nature of Freenet is unparalelled, but there are significant issues with updating and bandwidth. Unfortunately, much of Freenet was clogged with pornographers and other such dreck. Regardless, it’s worth a look: https://freenetproject.org/
Another adjunct to a Darknet lies in the use of laser or microwave communication nodes. These are hard to intercept and detect, can span long distances, and (in the case of laser) require no license to operate.
No one should consider accessing the general internet without the use of t(a)ils anymore.
Just a couple of thougths
Unfortunately we are going to be moving traffic through the red light district of the Internet. I see it as no more annoying that meeting in the more corrupt part of town so that we can talk. It is easier to meet where the cops already don’t go. The darknets are full of drug lords, pimps, whores, pornographers (who I am fairly ambivalent they simply need to be saved) but also child rapist (who I have nearly an unthinking hatred for). However these darknets are used by this seedy underground specifically for the same reason the Liberty movement needs to learn to use it. It is hard to track.
The rebuilding phase can include basically our own Redoubt owned IP backhauls. Please remember we will need to figure out a legal (it matters now) and low cost solution for this. The only long distance TCP/IP solution I have experience with is TCP/IP over HAM (our AmmRON cousins can help), directed 802.11 (mostly with Yagi’s). If we have a low cost laser solution lets build it and see if we can get it working.
A TAILS post is coming. Although you may be able to get away with a normal operating system when doing general work, when doing what I have come to call Liberty Operations, you must use a disposable operating system. i.e. TAILS. I can’t get it to work yet, ’cause I found out my computer limits the boot from a USB. I have not tried booting from the CDROM right now. Like today’s article (I will post a ARD about once or twice a week) there is a lot of stuff the Liberty guys most likely have not thought of. Like TLS, or TAILS. I think the OWS crowd is kinda of ahead of us on this as they tend to be younger and more technically comfortable and savvy. That is what part of the ARD project is. We have to explain to them what a MAC address is (fingerprint), and its relation to a TCP/IP address (SSN), and that relationship to a domain name (your name) and how routing works so they can understand how this or that is being done and make better decisions.
Bard,
T(A)ILS works best (IMHO) off a CD. I’m using it right now.
A live CD has the advantage of providing no place where malicious code can be written to infect the operating system. (Downloading files are a different matter. If you download a file, such as a video using T(A)ILS, save it to a thumb drive. Then reboot your system with T(A)ILS or another live CD and access the file with the computer physically disconnected from the Internet.. That way any malicious code contained in the file cannot leak your IP.)
I have a friend who is working on the laser angle. He’s unavailable at the moment, but informs me that the laser diodes in Blu-Ray players are sufficiently powerful to transmit signals over many miles, depending on conditions.
Apart from Freenet (which can be horribly slow) and covert transmission methods such as lasers, it bears noting that a great deal of data can be moved physically in the form of SD and thumb drives. “Dead Drops” are a very old way of passing information. Coupled with appropriate encryption, they can make an attacker’s job a formidalbe one, and can form an important part of an overall Darknet strategy.
Finally, anything that’s printed on paper cannot be recovered once the paper is burned and there is no know electronic means of entering your desk drawer and downloading your diary over the internet. Pen and paper have served to keep secrets secret for many centuries. Low tech may not be as glamorous, but it can still serve very well for some things.
Just a couple more thoughts.
Agreed. I will recommend people start to keep the old fashion, “day planner” and / or military memo book. put your contacts in that paper situation and keep little to nothing on your phone / electronically.
Avoiding the Internet is obviously the safest, however the point of the Darknet is to show people how to use the Internet as “anonymously as possible.”
The issue with TAILS on a CD with a USB stick, or TAILS on a USB stick is that with a USB stick, I have one thing to destroy. However it is true, you can just put TAILS on a CD, boot from it, store you files on a TrueCrypt USB drive. In case of emergency destruct situation, destroy the TrueCrypt USB stick first. Maybe that is it.
BTW, you may want to look over I2P as that is the solution I have settled on for most things. Hidden sites on I2P. TOR for general browsing from TAILS. Store data on Truecrypt in USB drives. We need to figure out the easiest, fastest, most complete way to destroy USB drives.
Guess I’m not the first. Here is a decent discussion of the method. First commenter is a “naysayer” but the last guy has some interesting input. http://crypto.stackexchange.com/questions/12744/is-there-a-way-to-generate-sound-one-time-pads-out-of-public-information
One of my ideas…
Public pad. The pad to be used for encryption is based on a published periodical found at most bookstores and news stands. Time, Newsweek, guardian, local newspaper,.. Whatever. Sender and recipient must have access to both. local paper may be good. Multiple combined pubs may be good.
The method and algorithm must be passed in person for best security.
Pad is generated by applying your own personal and very obscure algorithm. For example An algorithm that produces a particular endless string of numbers that do not repeat can be generated to a particular length. Points chosen on the string act as keys for deciding which document to use and which portions to use. 3.14159265359 key is 145 which means 3rd publication 1st story skip 5 characters.
Maybe someone has already implemented this and I’ve just been to lazy to google it.
Translate and follow popups have gotta gO!
Really? The translate button was that a couple of non-English speakers were fans and I use to translate the blog posting, then found the translate button so that I don’t have to do that any more.” I just added the follow popup myself. You must be on your phone as that is the only time it is annoying to me. I would get rid of the follow pop up before I get rid of the translate.
I will “ask a guy who would know” about the public pad. Then I will share it with you.
However this I can tell you. I am dead serious that if you and I were working for The Empire, we would call up Google and say, give us each and every one of the books you have scanned in and then drop that into a super computer. The public pad may be able to be broken, but the important thing is that the words only mean something to you and the guy you are talking too.
Freedom Operator 0: I love the girl in the green dress at the 1100 am Mass.
Freedom Operator 1: Are you sure? I thought the girl in the red dress at the 5:00 pm Mass was better looking.
Freedom Operator 0: No. The girl in the green dress at 1100 is the best looking.
Freedom Operator 1: Copy.
This is the way the pad should be used. Even if you break through all the anonymity, encryption and randomness, and then break the public pad. Even if you can uncover something on our disposable hard to trace TAILS operating system. It should be a conversation like this. If you get here, either you will be black bagged, water boarded and forced to talk, or (if you shutup) your lawyer will have a field day at a trial as they try and prove this or that.
See where we are going?
Sorry. Didn’t mean to be rude about the popups. Yes my eyephone is my only direct connect to “the man”. I like to let them keep an eye on me while I poo.
I definitely understand what you mean about content. I laugh though when I think about DEA agents decoding drug talk.
“yo broseph, did you cut and bag that yard?” (he says in the dead of winter)
No problem. If the two tabs are annoying for your I will will remove the subscribe one. I find it to be annoying on my NSA certified iPhone also. The translate button is useful for helping others not in this country access the same information.
We are going over the PAD idea and “a guy who should now” is thinking it through. We all need to read a bit more about it before recommending something.
This blog is a great idea. Security is achievable if sender and reciever are willing to do just a small bit of study to personally implement a method. Random one time pad has still not been satisfactorily beaten to my knowledge. This method is easily teachable to even old timers and can be done by hand or sped up and beefed up with a machine.
You are right. If you want to write up how use a one time pad. Here is how we make this defense in depth. Once we use every (stable) we can figure out to make you an anonymous communications, then what the actual words that you anonymously communicate is a one time pad. Sure you may wrap your one time pad, in PGP (GnuPG), push that through a random open wireless network, using a secure OS like TAILS, then both be on I2P. Thus when they come to unwind the onion.
1. Break the I2P anonymity.
2. Break I2P encryption.
3. Track you back to a random wireless network that you joined from sitting in your car.
4. Break PGP encryption
5. Then find your random one time pad.
6. Find your disposal anonymous USB based TAILS operating systems.
Thus they then have to find you on one of their many cameras and put that together. But even if they can see your car drive by at the right time, here is the deal. They then have to prove (anonymity) that you sent that transmission using a one time pad, which they may not be able to break. If you wanted to you could just burn your TAILS USB operating system.
See where I am going with this dark net? Anonymity (TOR / I2P) through an random open wireless network, with a disposal Operating System (TAILS), with a random one time pad. May not work, but it is the best that I can come up with now, and is better than 99.9% of what people are doing now.
This Tech stuff is WAY over my head. But Im happy to see something… ANYTHING counter the current level of intrusion we are all subject too, even if it’s just the acknowledgment that there are talented people such as yourself working on the problem of privacy we all are lacking…
There will be things for all to do. As JJS says, the ARN is for everyone. If you are not tech savvy, be a tester of the instructions we provide, tell us how to make them easier to understand. In the real world this is called “…volunteer to be a ginny pig.” Work on documentation. All people and help push the wheel, we can can just find a spot for you and everyone.
Have you thought about The Serval Project or OpenGarden? These are mesh networks that work with any android phone. I tried Serval but it ate my battery, however OpenGarden uses bluetooth and is more energy efficient. I set up both at my house to to play, and they both work well. Only downside is you need Android phones. OpenGarden has the added benefit that it works with Mac and PC.
Serval is an exciting concept, but I don’t think it is there yet. I worked on it with my phone for days and had little results. Perhaps you could point me to an instructable? Serval needs to interface with a stand alone wifi network. I could see a community of computers hooked to outdoor wifi antennas, and BAM! an instant network with text and voice on both computers (laptops) AND android phones. Throw in some open source phone system for the computer network like Starfish Open PBX, and a person with a little training could have a robust network up in a matter of days.
An open source Linux phone system is Asterisk. Also all Cisco routers can run a complete phone system. I also like the Serval concept and I am ok with early adoption if we think the solution will survie, and it they appear to be moving in the right direction.
Right now the Internet is reeling from … what has happened. I am sure in five to ten years there will be more people who figure it out. I really believe in 10 years there will be no http unsecured communications on the entire First World Internet. However into we try to address “…the issues” we will have to be early adopters of several technologies.
Thank you so much for writing I am liking the Serval project. http://www.servalproject.org/. The concept of loading up something and being able in a geographical region to restore phone service is neat. And keeping those calls off of the main towers … there is several applications for this. OpenGarden seems like a very useful idea also, but.. it focus appears to be on sharing an Internet connection, although obviously you talk among the devices. I am think of a grid rebuild phase, that be able to restore phone services to a limit area, seems like Serval project is heading toward the right way.
Do you want to write up a post and I will share it.
Using “Anonymous” logos isn’t the best way to stay below radar. Suggest you change out that graphic. Also, calling something “Dark” is inherently a bad connotation. Deepweb or darknet are things used by druglords and pedophiles. Maybe call it a Freedomnet or something. I guess I am saying, in short, don’t make yourself a target before you even get the concept off the ground.
I will begin to provide information to Liberty focused blogs on how to build a more anonymous systems. I do not expect this blog to remain below the radar. In truth there are “strange” things that happened when I started doing the research and the blog is suddenly acting “a bit unusual.” I agree the name should have a more Liberty focus. Have to think on that. I have to operate with the expectation that every thing I publish is already under surveillance. I hope there are those that use the information privately or publicly for freedom. However point taken.
This is awesome!!!
Another way to stick it to the powers-that -be.
Pingback: News From The American Redoubt: « Electronic Padlock
Pingback: AmRD: American Redoubt Darknet (ARD) an Introduction : Radio Free Redoubt