#DropKiwiFarms

Status
Not open for further replies.
So you're telling me this guy is retarded enough to dox himself on a website that never deletes stuff just to kick the site off of Cloudflare?
He's already basically doxed himself all over the internet for years, so why not? Besides that, the reporter that he doxed (Ben Collins) claimed that his own dox is incorrect, of course that could be misinfo. I'm not saying that @KaBob is GossiTheDog, but there's something weird there. He had screenshot from a logged account within a short time period.

What I thought at the time was that he is just a chaos agent of neither side, using drama to promote his own agenda. When I realized that, I stopped looking into it and decided not to mention him again to avoid giving him the attention he wanted.
 
He's already basically doxed himself all over the internet for years, so why not? Besides that, the reporter that he doxed (Ben Collins) claimed that his own dox is incorrect, of course that could be misinfo. I'm not saying that @KaBob is GossiTheDog, but there's something weird there. He had screenshot from a logged account within a short time period.

What I thought at the time was that he is just a chaos agent of neither side, using drama to promote his own agenda. When I realized that, I stopped looking into it and decided not to mention him again to avoid giving him the attention he wanted.

If it was him, he wouldn't have the Like button and maybe also had the Edit/Delete button, mind you only recent posts you make have the Edit/Delete button, but I don't know for long those functions are valid.

The whole thing could be a half-truth, someone did send him the screenshot but that person wasn't some journo, perhaps a fellow troon/troonlover that also has an account here.

Then again, who knows really. This last few days have only reinforced the idea to me that journalists are rotten trash and will do anything to promote their shit.
 
If it was him, he wouldn't have the Like button and maybe also had the Edit/Delete button, mind you only recent posts you make have the Edit/Delete button, but I don't know for long those functions are valid.
Requisite skitzo theory:
This is why I think all of them were in a discord together and cooked up the old addresses to dox so that they were verifiably real, but not useful. This was their first attempt at the bomb threat, which was a dud (excuse the lame pun). It was screenshot and archived within 6 minutes of posting then immediately shared with journalists and Gossi himself.
 
Mullvad didn't take Monero for a long time, which made some people suspect it was a honeypot. The fact that they decided to start taking Monero just PROVES that it's a honeypot!

I still use it though.
Taking Monero is a pretty good indicator it isn't, I'd say. That's new enough I don't think the TLAs have yet started using it for their own black budget expenditures like they do BTC.

That's incidentally why I don't think you're really ever going to see any effective federal action against crypto itself. They use it themselves for stuff they don't want to have to explain to Congress. Almost all the actual prosecutions are for things that would be a crime if you did them with stacks of Benjamins instead of Internet memecoins.
 
He's already basically doxed himself all over the internet for years, so why not? Besides that, the reporter that he doxed (Ben Collins) claimed that his own dox is incorrect, of course that could be misinfo. I'm not saying that @KaBob is GossiTheDog, but there's something weird there. He had screenshot from a logged account within a short time period.

What I thought at the time was that he is just a chaos agent of neither side, using drama to promote his own agenda. When I realized that, I stopped looking into it and decided not to mention him again to avoid giving him the attention he wanted.
To be clear, the dox of Benjamin H Collins in question posted by Kabob is incorrect, and appears to be the result of googling "benjamin collins" and taking initial whitepages results as gospel so it does not get the middle initial correct and the incorrectness flows freely from there.

This would line up with attention whoring behavior.

The correct dox had been posted before by a different user which I did recently verify with old yearbooks from Ben's alma mater and voter records in NYC.
 
I'd personally would like to hear from KaBob themselves because I always found that sudden doxxxxxxxxx from a near inactive account really suspicious. But if it's a stolen KF account, I doubt he can respond because of the whole email and password change stuff. It's also possible the account itself is sold since KF accounts aren't as easy to obtain atm due to faggots and fedposters and there are delusional tranny faggys willing to buy KF accounts to shit up threads or fed post. But yeah, the source of Gossi's dox gave me a suspicion it was him since the screenshot of him bitching on his dox I saved and archived showed it was from a KF account (Like, quote, reply were available to him on the screenshot)
post with the screenshot of his screenshot from a KF account:
he denied this claim stating it was sent to him from a journo which yeah, no one's believing that bs
his response to my claim he had a KF account:
Good spot. Yeah I’ve seen him use this dox as justification for his campaign against KF. Must have started to realize that keffals’ grift is not exactly a brilliant cause to chain your online reputation to.
 
Last edited:
Taking Monero is a pretty good indicator it isn't, I'd say. That's new enough I don't think the TLAs have yet started using it for their own black budget expenditures like they do BTC.

That's incidentally why I don't think you're really ever going to see any effective federal action against crypto itself. They use it themselves for stuff they don't want to have to explain to Congress. Almost all the actual prosecutions are for things that would be a crime if you did them with stacks of Benjamins instead of Internet memecoins.
Nah, I'm just kidding. I'm glad Mullvad finally started taking Monero, but I had a few suspicions before that. It's weird that it took them so long though, and how many allegedly privacy oriented services still don't (Protonmail, etc).
 
And yet Nullgor shambles on, if not victorious at least still going. Imagine representing a massive amount of American power the way this effort did, expanding as much capital as they did and failing to succeed. It's like burning a entire jungle to the ground to eliminate one enemy and finding the guy fucked off to the next rainforest over. You are surrounded by scorched earth and failure while the sniggering never stops.
 
But until then, I suggest that all farmers take advantage of Cloudflare's free VPN services.
Nah, not interested in increasing their market share in the least, not even for free. I don't even trust the VPNs I actually do use, why would I use one I actively distrust? All it takes is one bent employee to dox anyone using their shit, or they might even voluntarily do it to lick the troon gash.
 
Not working for me. Maybe an older version?
Clownflares thing doesn't like my other proxy. It keeps turning off. My search for the mythical 7 proxies continues...

Despite all its branding, Cloudflare WARP is actually just Wireguard under the hood. My recommended setup:
  1. Download the official wireguard client from: https://www.wireguard.com/install/
  2. Download the latest release of wgcf from https://github.com/ViRb3/wgcf/releases
  3. Use the wgcf CLI to to register for a new WARP account and generate a wireguard configuration, which will look like this:
    1. Code:
      [Interface]
      PrivateKey = $THE_PRIVATE_KEY_GENERATED_BY_WGCF
      Address = 172.16.0.2/32
      Address = 2606:4700:110:8ac0:a3b6:9c8c:95df:8490/128
      DNS = 1.1.1.1
      MTU = 1280
      [Peer]
      PublicKey = $THE_PUBLIC_KEY_GENERATED_BY_WGCF
      AllowedIPs = 0.0.0.0/0
      AllowedIPs = ::/0
      Endpoint = engage.cloudflareclient.com:2408
  4. Import that configuration into the official wireguard client and turn it on!

WARNING: When using WARP's free tier, your original IP address is technically leaked to webservers hosted on the Cloudflare network. These servers will see the requests as coming from Cloudflare, but your original IP is still passed along in the X-Forwarded-For header. Most servers will not check this, but it is there. Note that this header is not passed along to webservers outside of Cloudflare.

You can mitigate this in two ways:
  1. By running second proxy layer before turning on WARP.
    1. If possible, I suggest configuring this on your local router. I just tested this and layering the two seems to work just fine. WARP still provides a speed benefit for most sites I tested.
  2. By upgrading to the paid WARP+
(Note: I've seen conflicting reports on this, but some chatter from Cloudflare noting that this IP leak is a technical issue and not intentional, stating that they are working on removing this header so IPs won't be leaked in the future.)
 
View attachment 3717630
Marginalised people don’t get support from the FBI to purge people from the Internet for laughing at them. Marginalised people aren’t known for making a living on the back of playing video games and running grifts on gofundme. They’re not millionaires who sit around on Twitter orchestrating DDOS campaigns and smugly gloating over people being arrested for laughing at them, When I think of a marginalised person I think of the dishevelled guy I saw in the store earlier counting change for a bottle of liquor. Not some pervert on Twitter with a neurotic obsession with ‘fascism’.

Lucas didn’t turn public opinion against KiwiFarms, he had mobs harass cowardly tech companies into meeting his demands and the rest was done illegally. Public opinion wasnt the reason for our downtime, criminal activity inspired in part by Lucas was.

Finally, we’re not free speech absolutists. We ban people for organising mob campaigns, or plotting to flood people with messages and complaints. We also don’t want the people we talk about silenced, they’re at their funniest when they’re sperging out over the Internet,

Who said Keffals should be arrested for anything other than giving HRT to minors?
I'm a free speech absolutist, but Kevin is still a moron. He could have quoted somebody who said both these things but he didn't because this person probably doesn't exist. Kevin never saw anyone say these things, he invented them so he could actually appear to defeat someone in a faux-debate that only involves himself.

These two things don't inherently contradict either. Keffals own stated goal (see the NBC article by Ben Collins) was to shut down the Kiwi Farms through illegal means. Keffals desired actions, not speech. His speech shouldn't be punished and though he's not American (like Kevin is) the First Amendment protects most all speech that advocates for crimes but actual conspiracy to commit crimes remains illegal. Of course, proving Keffals directly participated in crimes rather than merely advocating them is difficult but it's also not my job, that's for the state to determine.
 
His speech shouldn't be punished and though he's not American (like Kevin is) the First Amendment protects most all speech that advocates for crimes but actual conspiracy to commit crimes remains illegal. Of course, proving Keffals directly participated in crimes rather than merely advocating them is difficult but it's also not my job, that's for the state to determine.
It still has to pass the Brandenburg test, and it actually doesn't. Speech that can be criminalized has to both be likely to result in imminent lawless action and actually intended to do so. Keffals actively encouraged imminent lawless action that was both likely to result and actually did result.

That doesn't mean it's necessarily automatically illegal, but it isn't constitutionally protected.

It wasn't abstract advocacy of crimes, but incitement of specific crimes against specific targets.
 
Despite all its branding, Cloudflare WARP is actually just Wireguard under the hood. My recommended setup:
  1. Download the official wireguard client from: https://www.wireguard.com/install/
  2. Download the latest release of wgcf from https://github.com/ViRb3/wgcf/releases
  3. Use the wgcf CLI to to register for a new WARP account and generate a wireguard configuration, which will look like this:
    1. Code:
      [Interface]
      PrivateKey = $THE_PRIVATE_KEY_GENERATED_BY_WGCF
      Address = 172.16.0.2/32
      Address = 2606:4700:110:8ac0:a3b6:9c8c:95df:8490/128
      DNS = 1.1.1.1
      MTU = 1280
      [Peer]
      PublicKey = $THE_PUBLIC_KEY_GENERATED_BY_WGCF
      AllowedIPs = 0.0.0.0/0
      AllowedIPs = ::/0
      Endpoint = engage.cloudflareclient.com:2408
  4. Import that configuration into the official wireguard client and turn it on!

WARNING: When using WARP's free tier, your original IP address is technically leaked to webservers hosted on the Cloudflare network. These servers will see the requests as coming from Cloudflare, but your original IP is still passed along in the X-Forwarded-For header. Most servers will not check this, but it is there. Note that this header is not passed along to webservers outside of Cloudflare.

You can mitigate this in two ways:
  1. By running second proxy layer before turning on WARP.
    1. If possible, I suggest configuring this on your local router. I just tested this and layering the two seems to work just fine. WARP still provides a speed benefit for most sites I tested.
  2. By upgrading to the paid WARP+
(Note: I've seen conflicting reports on this, but some chatter from Cloudflare noting that this IP leak is a technical issue and not intentional, stating that they are working on removing this header so IPs won't be leaked in the future.)
Thanks for the tip. I'll play around with it see if I can get it running better. I like options. I'm not a tech guy so I have a guy who does that stuff normally. I tend to keep a proxy running underneath ao even if something leaks like that it should only be the proxy, I had a problem getting them working with each other sometimes. Like I said, not a tech guy, so thanks.
 
Clownflares thing doesn't like my other proxy. It keeps turning off. My search for the mythical 7 proxies continues...

Despite all its branding, Cloudflare WARP is actually just Wireguard under the hood. My recommended setup:
Thanks for the info. Turns out that I'm exceptional. Kiwifarms.net was in my HOSTS file for some reason. Nice to know that WARP pays attention to it.
 
Seems like the Fiberhub owners wife got the Josh's mom treatment.
DKF.png
[A[
Fired because her husband owns a company that provides an Internet service, imagine it.
The usual crowd are celebrating as usual. Including AzureMako
 
Fired because her husband owns a company that provides an Internet service, imagine it.
The usual crowd are celebrating as usual. Including AzureMako
Like I said in the Jiz Long-Gone thread, this one makes me actually mad. The worst part is that she was clearly fired because of harassment by these people, who then use the fact that she was fired as proof that she must have been a bad'un, because otherwise why would she be fired? They're disgusting, loathsome, inhuman creatures who thrive on the suffering of others - something they project onto us like an IMAX.
 
Of course, proving Keffals directly participated in crimes rather than merely advocating them is difficult but it's also not my job, that's for the state to determine.

Not as hard as Keffals and his fellow cyber criminals seem to think it is, thinking Moxie Marlinspike (the far-leftist hacker behind Signal, which is what Keffals & Co admitted they were using to co-ordinate their attacks on KF and its ISPs) would cover for their cyber crimes:

What user data can U.S. federal law enforcement obtain from providers of encrypted messaging services? A recently disclosed January 2021 document from the Federal Bureau of Investigation (FBI) supplies a concise summary with respect to nine different “secure messaging” apps. It shows that with legal process, the FBI can get various types of metadata, and in some cases even stored message content. Exactly what’s available, though, varies widely by app. The one-page document should give useful guidance to privacy-conscious people – including journalists, whistleblowers, and activists – while also helping to dispel misconceptions about the FBI’s surveillance capabilities (or lack thereof) in the encrypted messaging context. Kudos to government-transparency nonprofit Property of the People (POTP), run by “FOIA guru” Ryan Shapiro and indefatigable lawyer Jeffrey Light, for obtaining this record under the Freedom of Information Act.

Dated Jan. 7, 2021, the document states that it reflects FBI capabilities as of November 2020. The apps included in the chart are iMessage, LINE,
Signal, Telegram, Threema, Viber, WeChat, WhatsApp (owned by Meta, fka Facebook), and Wickr (which was acquired by AWS in June). Most of these apps—iMessage, Signal, Threema, Viber, WhatsApp, and Wickr—end-to-end encrypt messages by default. As for the rest, Telegram uses default end-to-end encryption (E2EE) in some contexts, but not others. E2EE is on by default in newer versions of LINE, but it may not be turned on in older clients. And WeChat, owned by Chinese giant Tencent, does not support end-to-end encryption at all (just client-to-server encryption). This variance may explain why the document refers to the apps as “secure” instead of “E2EE.”

The Reality Behind the Myth

Thanks to FOIA and its zealous disciples at POTP, the public can now see the internal FBI document that neatly summarizes the reality behind the myth. It shows that despite its “going dark” claims, the FBI can obtain a remarkable amount of user data from messaging apps that collectively have several billion global users. (The ability to test the government’s public claims against its internal statements is one of the reasons why public access to government records, POTP’s raison d’être, is so crucial.) It shows the role that cloud storage and metadata play in mitigating end-to-end encryption’s impact on real-time communications surveillance. And it shows which popular E2EE messaging services truly do know next to nothing about their users.

If users think the encrypted apps they use don’t keep much information about them, the FBI chart shows that belief to be largely false. With some exceptions, many major E2EE messaging services hand over all kinds of data to federal law enforcement, and cloud backups can even enable the disclosure of stored messages sent on two of the biggest E2EE messaging apps. Even if little or none of what’s in the document is truly news, it’s still helpful to see it laid out so succinctly in a single page. If you are concerned about messaging privacy, use this chart (together with privacy and security guides specific to your situation, such as for journalism or protests) to help you decide which app is best for you—and share it with the people you chat with, too. That way, you can make a more informed decision about which app(s) to keep (and which to leave behind) as we enter the new year.


For there to be a prosecution of Keffals & his fellow cyber criminals, the companies targeted by his criminal conspiracy would have to file criminal charges. Has anyone done so? NO! Cloudflare could've reported Keffals, Liz & Co for openly blackmailing them on Twatter (they literally placed them on a DDoS hitlist that is still available to Github to this day), all the other companies who were DDoS for briefly hosting KF could've contacted their respective LE or the FBI, AFAIK they ALL wouldn't. They would rather give into the DDoS blackmail and boot KF off their systems than have a spine and file a criminal report against these cyber criminals openly targeting them, mocking them, blacklisting them on Github. I blame LE too BTW, apparently ISPs think it's such a hassle to have to deal with LE that they'd rather give into cyber criminals and be done with it than assist LE with catching the ones blackmailing them with DDoS threats. This passive attitude is so frustrating to me but that's ISPs for you, they'd rather cooperate with cyber criminals just to get them off their backs than call LE on these crooks. LE needs to make it as easy as possible for an ISP to report being targeted with blackmail DDoS attacks and to receive assistance from LE with such attacks ASAP. LE, something is very wrong when targeted ISPs would rather negotiate with their cyber-extortionists than with you.
 
Status
Not open for further replies.
Back