Home › Forums › MGTOW Central › MGTOW.com blocked by Midco in Minnesota??
Tagged: 404 The Matrix
This topic contains 25 replies, has 11 voices, and was last updated by Anonymous 1 year, 10 months ago.
- AuthorPosts
The same that happened to brother Gargamel happened to me. It mean that something is happening, someone, somewhere, don’t want people accessing this website.
There is no logical reason, no malware, no illegal content, no scam, etc… The only reasons they block us are political, they are losing slaves, they are starting fearing us, and this kind of “silent action” just shows how coward they are, they are starting to get desperate.
An idea, we can create a hidden service for MGTOW website on tor. So if you are using tor, your traffic will never need to go trough the “surface” to get here.
MORE TOR users?
MORE TOR security!TOR is YOU going YOUR OWN WAY.
TOR only accessible websites are just like this one. But they are not (Officially) indexed by the normal search engines.
It’s not the ONLY domain like this. There are others.
This is a TOR only Accessible as an example.
https://www.propub3r6espa33w.onion/
And here is a BASIC primer on this.
https://www.expressvpn.com/blog/best-onion-sites-on-dark-web/
Protect yourselves brothers. They are coming after you. Your children. And you Very young men. If the POLICE are starting to arrest kids at 11 years old in the UK. I would look into this.
Again. Be CAREFUL and BE QUIET. TOR is not a Protection medium. It is ONLY a way for you to get to where you want.
Even FACEBOOK has a TOR site. So if FACEBOOK is blocked for most of you in countries. You can still get to it. But once you are there? Well… That’s your ass.
But when they shut down the internet. Sometimes this is your ONLY means of communicating with the outside world.
Good day my brothers. WE are only alive if we are FREE.
You are all alone. If you have been falsely accused of RAPE, DV, PLEASE let all men know about the people who did this. http://register-her.net/web/guest/home
Midco in Minnesota??
Connect the DOTS.
https://en.wikipedia.org/wiki/Sioux_Falls,_South_Dakota
What is here is the headquarters of this ISP. Now again. Connect the dots.
FYI Dakota is known as a Dirty state. And its not due to trash or coal etc.
Again. Look at what is there in the area, and then you might get to see why there is so many quote on quote “Problems” with some services.
And that is why there is such a drive to shut down things like Privately operated M.A.N.s
Nothing is more dangerous than people that have their own network to communicate that is out of band.
BTW, where this location is of the ISP is where there is a Military Stronghold of companies. Almost all aerospace. Once you realize the real score, you start to get away from all the stupid things that distract you from the real people behind these things.
It’s always been the same old people, and the same old families always wanting to get their way. And control of the men has and will always be the first thing on the table.
Try to keep your mind open to new ideas. Yes, even the idea of a NAWALT. However. You got to wonder just how many of those NAWALTS actually work as spies. 🙂
So if you are REALLY lucky, you might get one of those women. At least you will have a good marriage. 🙂
You are all alone. If you have been falsely accused of RAPE, DV, PLEASE let all men know about the people who did this. http://register-her.net/web/guest/home
Anonymous3I appreciate iMickey503 posts and his knowledgeable advices.
However, things are a bit worst than we believe.
There are several layers of surveillance and censorship.The first layer is censorship for the average Joe. That is a simple DNS block, you can still get to the site, but not by name. That is something effective for most users.
The second layer is a total block of traffic. Now, even using another DNS you cannot get to the site. Now you have to resort to a VPN, and that is for the IT experts.
The trouble is that probably the VPNs are the second most controlled traffic in the net.
The third layer is TOR. The problem with TOR is that probably was developed by the same guys that people intend to avoid. That traffic should be THE MOST CONTROLLED IN THE NET.
Remember that the “silk road” was busted while using the “deep web”.
We are now in a time that will be called “the big data” time. Massive amounts of information are gathered preventively. People are monitored without any reason and profiles are created automatically. Its the time of meta-data, the data about data. What pages you visit, how often…
“Ghosting” online is the same as the real world. You dont walk around with a cape or a mask. That has the opposite effect of what is intended. You blend in, indistinguishable from the vast morass of humanity.
The same way we should not use the “deep web” if we wish to remain anonymous.I am concerned, and I have repeatedly raised the issue of censorship of MGTOW.
However my proposal is not to go high-tech, but low-tech.
My proposal would be hiding in plain sight, using the same techniques used by every population subjected to repressive censorship: human code.I envision a simple word replacement where the meanings of mainstream words are translated into MGTOW speak.
That would allow the usage of general sites, and even have MGTOW content openly/hiding in the media!
Its not easy to come up with, and it could only be done in a joint effort.
It could be compiled into a kind of dictionary, that would also work as a compendium of MGTOW knowledge.
It might appear extreme today, but if we need it tomorrow, then we might not have the time to organize it.
Silk ROAD was taken down in a whole other way.
The main guy of silk road was taken down due to posting on a forum with his open user ID. bascily logging into the forum as JOE PUBLIC.
The FEDS did not take down the site by Blocking it. What they did was quite different.
How they took down silk road was much more mundane. They strangled it for funding and hosting.
How? They caught the guy, and then took control of all his bitcoin accounts that he released. Anything tying him to the Bitcoin accounts was confiscated.
They had him, so they were able to do whatever they wanted. Since he had sole control of the web site, he was the person they went after in order to take control of the site and then honey pot it. When word got out that the feds got him, (spread through freinds) people stopped using it. However, the dirty secret was that Government officials and Swamp pals were using the damn thing 🙂
That is why the FBI closed down the site instead of operating it at arms reach like they do with 4chan.
8chan is still SAGE for now. But as always, it was one LITTLE mistake that got him. And that was auto logging in as HIMSELF. As soon as that happned word got out he was the admin And it just went NUCLEAR from there.
The site was not Blocked.
About TOR TOR was developed by the US NAVY.
The thing is with TOR traffic is that it looks like any other traffic. There are no TAGS per say on TOR traffic. You can do some IP filtering to target TOR hosts. But the more nodes you get the more difficult it comes to using a device on the ISP end that will block or track packets that flag with TOR traffic.
Now TOR is not PERFECT. However, when they start blocking TOR traffic, then they got an issue. They are blocking GOVERNMENT TOR traffic.
So now the DARK web. You CAN filter out TOR traffic in a way, but you can’t do it on a level that IPV6 can handle.
On a IPv6 network, you just can feasibly do it even with the amount of power that NSA servers have online.
How do you get THAT data? Check out the power consumption figures. That is Public data. You can also look at the building configuration as well.
Now VPN’s are NOT out of the scope of the normal guy. Its just an added expense.
As far as VPN traffic being Monitored? Well. That’s a BIT of a stretch. With SSH encapsulation, you can’t tell weather that is BANK traffic, or facebook traffic.
And there is one more level of security that you can do at the server end of the website. But that as you are correct is out of the scope of the mere normal mortal.
Okay so lets just get one thing out of the box. In order to filter traffic, you have to read the packages contents in the packet. Doing this with IPV6 and enabling security on that packet makes this almost impossible to do WHILE maintaining the TTL.
the TTL is the TIme To Live. And the reason why this is important is if that Packet goes over so many hops its is dropped.
But that a great idea for security.
If the packet takes longer then the number of hops it takes to get there (say it takes 1 SECOND to get to your computer from the web site)
And it takes 2 Seconds, THAT IS A F~~~ TON OF TIME NOT accoutned FOR.
That is going to give any simple software add on to the the users computer or firewall a red flag.
That means the TRACERT is going to show that there was this many hops, but there is no way that route takes that long.
In computer time this happens is the mS (Millisecond range)
That can tell you almost ASAP what that someone is trying to mess with your packets. No there are ways around this, but that would require some admin to capture all packets. Not feasible for everyone on the Net.
Again, you would have to be able to make sure the route was the same at all times.
Again, if you want to see how its done right? Check out ThePirateBay. It is DAMN NEAR IMPOSSIBLE to BLOCK.
Again, Routers and Switches are STUPID. THey need to be able to FILTER OUT EVERYTHING in order to do this kind of blocking.
And the WHOLE idea of the INTERNET was to make this kind of attack IMPOSIBLE.
MGTOW.com if they want to can stay up just fine as long as there are no Pointers to the host. FOr right now, we all know the host.
If the HOST was to be Masked out, and the IP address that it uses was like A DYNS address that changed each time the handshake was matched, then a Public key could be shared that could be locked only with a private one that MGTOW.com users would have.
Again, you can’t stop the BROADCAST of Packets. THey will still end up someplace.
And say you blocked an IP address. You just s~~~ out more of them. And under IPV6, you can have a Billion, and it would not matter. You can make new ones just as fast as they block them.
So now you either pull the plug of the internet? Or you start jailing he wrong people who use facebook. That would also include all Public education institutions.
All of this can be done with a SIMPLE Browser extension or patch.
And all the tech is already there built in to your browser.
THere is one more thing that I find odd. It’s not the GOVERNMENT in large doing this. Its Private Corporations that due this under the government umbrella.
It’s a scapegoat. So the People doing this are not connected with the government directly.
You are all alone. If you have been falsely accused of RAPE, DV, PLEASE let all men know about the people who did this. http://register-her.net/web/guest/home
Now the thing that is going on in Minnesota is what more disturbing. Keymaster might have to weigh in on this, but the traffic routes for the guys using the Nodes in and around the area seem to be monitored at a much deeper rate then anyone would have thought.
There is a bug in one of the appliances used that gives itself away. Again, its small, but there is an error on the timecodes that it puts out. It always uses the same number set for the node that pushes the traffic past the TRACErt, and then substitutes another false number for number of hops.
Bascily, the RANDOM is not as RANDOM as it would have seemed.
You know WHY I think this? Only GOvernment contractors seem to get this treatment. So we got at least a few of you guys on here.
This should be a wake up call to the people who work in Aerospace or government to start finding other routes for their ISP connection and traffic routes.
That or you are in the area of a University that happens to do Government work.
For example, Take a look at this TRACERT from a government ISP.
1ip-10-0-0-0.us-west-1.compu0 ms1 ms1 ms
2ip-10-0-0-0.us-west-1.compu1 ms1 ms0 ms
3
no response
4
no response
5
no response
6
no response
7100.66.6.20521 ms24 ms13 ms
8100.66.4.6517 ms15 ms22 ms
9100.65.11.1291 ms0 ms1 ms
1052.93.47.1092 ms2 ms2 ms
1154.240.243.1262 ms2 ms2 ms
1254.240.243.1113 ms2 ms3 ms
13be-111-pe01.9greatoaks.ca.i2 ms2 ms2 ms
14be-12544-cr01.9greatoaks.ca4 ms3 ms4 ms
15be-11025-cr02.sunnyvale.ca.5 ms29 ms29 ms
16be-11721-cr02.denver.co.ibo30 ms30 ms30 ms
17be-10517-cr02.350ecermak.il53 ms29 ms29 ms
18be-10577-pe03.350ecermak.il51 ms51 ms51 ms
1950.242.150.13052 ms51 ms52 ms
20
no response
21lw-dc2-dist1-nexus-eth4-1.r58 ms58 ms58 ms
22lw-dc2-dist1-nexus-eth4-1.r61 ms61 ms61 ms
23
no response
24
no response
25
no response
26
no response
27
no response
28
no response
29
no response
30
no response
Destination
http://www.mgtow.comBoy that sure looks great. ONE PROBLEM. Sunnyvale Ca, is NOT on the EAST COAST.
Use this tool and find out for yourself.
http://www.monitis.com/traceroute/
Again, once you start putting together the puzzle , You get a clear view of what is going on.
The idea is to route traffic the fastest way to get there. But as you do this, you will notice that your nodes DO NOT CHANGE.
If that is the case, I would be worried.
But for the meantime? Just have it in back of your mind. MGTOW is getting to big now to shut everyone up. And with what happend at YOUTUBE?
Its going to be one HELL of a ride now boys. Its just a matter of time before s~~~ starts hitting the fan like you have no IDEA>
You are all alone. If you have been falsely accused of RAPE, DV, PLEASE let all men know about the people who did this. http://register-her.net/web/guest/home
Anonymous3iMickey503,
Again you have great posts, with a lot of know-how.
Let me tell you straight away, I am not an expert in cybersecurity. I am all over the place, from hardware to software, network and training. There is no way anyone can be an expert like that.But one thing I can tell you, WE cannot trust appearances. The fact that the silk road was supposedly stooped by a “mistake” of the admin leads people to think the deep web is secure. I dont believe it, they go to great lengths to hide their true capabilities.
The first thing intel does when it develops something is to be sure that THEY can be defended against it. If they create TOR and allow people to use it, its because they have a way to monitor it.
Its like encryption, that is not supposed to be impossible to crack. It is supposed to take a long time to crack to be of any use.
But strangely we use “official” encryption systems, and we pretend that it is safe against the guys that develop it and allow us to use it?
Its the same as buying a vault from people that specialise in stealing from them.As far as VPN traffic being Monitored? Well. That’s a BIT of a stretch. With SSH encapsulation, you can’t tell weather that is BANK traffic, or facebook traffic.
My prior comment still applies. But let me give you an example: a known brand of firewalls that I had training with uses HTTPS reassembling. The webpage terminates at the firewall, then its secured with the firewall certificates and sent to the user. The user never sees the original site certificate. This means that the HTTPS traffic is inspected for virus and attack signatures (plus whatever you want to look in it). And this is the low-end consumer equipment.
They hinted that at provider level equipment they have “other tools”.But notice that I never mentioned anything about the traffic being analysed.
Look at it like a house where you go to buy illegal stuff. Either the house is bugged, or the surveillance only cares about identifying who goes in.
That is the issue with big data. You dont need to know what everyone is doing, you just need to sort the individuals of interest.
If VPN services are know, then you just need to know what IPs go in and what IPs go out. If the user is using a “cooperative” ISP then he is personally identified by IP and session. No traffic payload analysis is necessary.Now remember the sentence: if you are doing nothing wrong, then you have nothing to fear. Intel takes this seriously. If you are hiding your traffic, then that makes you more of a suspect. And if you are a suspect I bet the OS or the computer hardware itself have the backdoors necessary to look at what you are doing.
I say that because that is what I would do…
- AuthorPosts
You must be logged in to reply to this topic.

921526
921524
919244
916783
915526
915524
915354
915129
914037
909862
908811
908810
908500
908465
908464
908300
907963
907895
907477
902002
901301
901106
901105
901104
901024
901017
900393
900392
900391
900390
899038
898980
896844
896798
896797
895983
895850
895848
893740
893036
891671
891670
891336
891017
890865
889894
889741
889058
888157
887960
887768
886321
886306
885519
884948
883951
881340
881339
880491
878671
878351
877678