Skibidi Farms / NoLimitsPedia / Gnarpedia / Totencord / Hutucord / Spawnism / Goyswats / Kastle / UCS / Kiliverse / Dwinny / Thugchan / Zukencord - you will NEVER GUESS what the "IRONIC" PEDOPHILE RING openly admitted to distributing!!!!! 😱😱😱

https://fellas.farm/ is back and has rebranded, ifent seems to be gone, but it could be another gay op. https://archive.li/qZkTh)
1764653280660.png
 
Fella Farms is advertising a Discord server called PNDL.
1764721873740.png
1764721806152.png
Discord fucking hates Tor IPs signing up and if I use a VPN I'd have to verify with my phone number. Would anyone else be able to export this?
 
Discord fucking hates Tor IPs signing up and if I use a VPN I'd have to verify with my phone number.
Discord bans VPN registrations even if you verify with a phone number. You can try using SMSPool for the phone number verification and a residential VPN.
 
Can these guys just fucking pick what site they want to use?
Skibidi Farms now redirects to Fella Farms.

1764740270207.png
Archive
Edit: I was gonna add a post but it's old
Edit Edit: Looks like some weirdo is spamming CSAM in the Unregistered board 🤮
 
Last edited:
For those planning to check Fella Farms right now:
There is a pedo spamming CSAM in threads. I recommend you go to about;config (assuming you're using Tor Browser) and set permissions.default.image to 2 so images will not load.

Fellas Farm current backend IP: 82.153.138.176, hosted with iHostART in Romania again. While iHostART ignores these reports, his upstreams won't. Tube has terminated Skibidi Farms and Fellas Farm from their downstreams before.

Code:
curl -H "Host: fellas.farm" http://82.153.138.176/

If you want to report it, CC abuse@pletx.net and abuse@tube-hosting.de in the report email, besides iHostART's report@abuseradar.com IPXO email. Guaranteed termination, if you give them a good reason.
 
Last edited:
Fellas Farm current backend IP: 82.153.138.176, hosted with iHostART in Romania again. While iHostART ignores these reports, his upstreams won't. Tube has terminated Skibidi Farms and Fellas Farm from their downstreams before.

If you want to report it, CC abuse@pletx.net and abuse@tube-hosting.de in the report email, besides iHostART's report@abuseradar.com IPXO email. Guaranteed termination, if you give them a good reason.
I just emailed a report.
 
Discord bans VPN registrations even if you verify with a phone number. You can try using SMSPool for the phone number verification and a residential VPN.
That’s not necessarily true, it only really does that if you friend request/join servers too often or you’re just using a shitty VPN that gets tons of traffic (like a free one). The best way to not get phonecucked is to sign up on an incognito tab (or clear your cache/storage if on mobile before signing up) and limit the amount of friend requests you send as much as possible until your account gets at least 2-4 weeks old.
 
pretty sure your original IP can be leaked due to webrtc which most voice software uses also Mullvad glows and so does Telegram, as expected of pedoes, they don't know what glows and what doesn't.
You can block WebRTC leaks.
Source on Mullvad glowing?
I don't think Telegram "glows" but I agree it's not private.
That’s not necessarily true, it only really does that if you friend request/join servers too often or you’re just using a shitty VPN that gets tons of traffic (like a free one). The best way to not get phonecucked is to sign up on an incognito tab (or clear your cache/storage if on mobile before signing up) and limit the amount of friend requests you send as much as possible until your account gets at least 2-4 weeks old.
Yes, Discord has limits on friend requests, server joins and even sending the first message in a DM (all three of those will be subject to captchas if it thinks you're sus). But even signing up with paid VPNs like Mullvad or iVPN is likely to get you banned. I agree it's based on how much malicious traffic gets through those VPNs, that's why I recommended residential VPNs.
 
Source on Mullvad glowing?
m247 a lot of the web uses m247 which might as well just be Cloudflare 2 as for example when your using Mullvad on Discord your just flowing through the same routers and switches, it's like browsing a Cloudflared site on a Cloudflared proxy.
you can listen to this mp3 of it or the shitty transcript I made once

Everybody acts like Mullvad is something special when there the exact same commodity server as every VPN. In fact the same huge international providers are actually a problem. Like MT247 and Datapacket. Because it centralizes all information in the hands of the few people, when privacy benefits decentralization. For example: Mullvad, iVPN, TorGuard, Nord and Proton all use M247 for there New York exit.

So these influencers like Mental Outlaw on YouTube say "OOH MULLVAD IS AMAZING but Proton, they are a honeypot if you use Proton your going to jail", meanwhile the exit closest to him he's from Massachaucets in New York through the same providers of routers and switches, because they use the same large datacenter providers it makes every single country the same. So for example Mullvad's mexico exit is datapacket, but this is a British-US company, what is it matter if you have a Mexican IP address and your getting a court order back from the UK? It all just becomes the same. And all this centralizes the information, in fact these huge providers are so large there in so many countries that the websites themselves are hosted on these providers. For example Discord is hosted on datapacket, but this is Mullvad as well, this means if you use Mullvad for Discord your flowing back and forth from the same company's routers and switches over and over again. How can you tell me it's not a conflict of interest? To have datapacket help you hide from datapacket? So if everybody here interacting is using these VPNs which are using these same providers? Then they just become the new global ISP with there seeing both sides of all of your conversations, your texting somebody but it's flowing onto the text servers, but then it's flowing back through Mullvad, Mullvad able to see this and no more is this more clear then with webrtc calls, so many chat apps from XMPP, to Signal, to all these web apps, many of these different use webrtc for audio calls, and would this means is that the servers only coordinating the connection between the 2 people who are then connecting direct.m247 and datapacket are seeing both sides of those conversations, both peopls home IP addresses and as if it flows from your house to one of these servers and then back through mt247 or datapacket they just become the all-seeing eye all these conversations your having on Naster even there using iVPN but your both m247. Boom all this stuff is doxxed and a lotta people say: "what's the big deal? Who cares? What is it matter that it it's all so centralized and the big problem is not that even those servers are comprmised, they don't have to compromise those actual Mullvad servers, the bigger issue is it's all flowing through the same routers and switchs which becomes a huge problem for passive AI servelience.

So they can't do survellience the entire Earth, on every router and switche around th ewhole so they instead focus on the centralized showpoints which we've talked about the past podcast that I've done. We've talked about how they've done it with the ocean cables. We've talked about they're interested in this appearance centers, cause they don't want to give a warrant or sabina to every single company if they can get in with these large providers with these appearance cneters then there sharing the data with everyone else in these centers. Another reason that these huge providers are bad for a AI survell;ience is, is because it removes the complexity of different setups and when your trying to study something you wanna contol for all these variables. Think about a sciemtofc experiment, right these the indepent variable and dependent variable you remove all of these different complexities and instead be able to measure the speed of one person interacting with M247 compared the other person on the other side that with M247. And some people "What's the hard proof? how do we zctially tayt this AI survellience is possible"? And ironically the proof can come fro Mullbsf'd own whitepapers, so Mullvad... funded a study which I'll get in a moment. But in this study the did it demonstrated that this size of the datapackets can be used by AI to see what website your going to and I agree with Mullvad on this problem. The thing is doe I disagree with how they're solving it. So let's go into first what the study is and then they're solving it.

So in this study, they did what's called a "closed world study", and what this means is they took in this oartciular paper a hundred websites which they fed iunto AI and had it learn the packets sizes and how it works and then they throughj the VPN they sauid: "Look/... we we're going to one of these 1 hundred wbsites and we did a few times, and the AI was able to go "look I see what websites your going to"! and then they had.... uh... this... techniquye that I'mma get into a MOENT that Mullbad applied and they go "look now we ara able to hide the size og tjhe data, now I agree with Mullbad on the proiblem, I disagree with there solution.

So me and them both agree that the problem is when the data packets are small, and it's just a website, and so it's easier for the AI to study that, I agree they said that on their site and I agreed that's the problem so I'mm recommending to mixxed traffic, whrre you a bunch of things sending traffic at once maybe your streaming some music, maybe your looking in a movie, a your looking a t a webiste all these diferetn traffic sources makeit much more confusing for the AI to study these oackets sizes to study the timing so under simplified privacy system, we promote using a dual-layer and what this means is.., having a system-wide VPN that's close to your home. As close as possible, and then... from there on the deconf we have these browser only fingerprints and what this does is if you two open at once the system traffic on the layter 1 that this makes the datapackets, a different size, from crossing the coean cavbes the layer 2 to the layer 1, then theyt are from the layer 1 to your home internet service provider, and the larger these pacjets are, and the more mixxed it is, on that layer 1, the better the this hides the traffic. So if Mullvad or these academics from the whitepaper if they were to listen to this podcast they would that say, never proved that mixxed traffic can't be studied and that's my point, they had to remove mixxed packets from the menu in order to do there study itself and what do they recommend? What is Mullvad's new protocal? Which there calling "the maybe not" protocal, that's it's like data misspell daita what are they recommendign why there recommendign small isolated packets!! So they're new system of isolation first slows the website down, then, inserts random noise which there calling "padding" to spread out the size of the packet over time. the problem with there system, is that it isolates it. So iat first takes the first thing coming in, and it slowing it down, and doing all this bullshit, but now! All the things that your doing are waiting in line like imagine your at the grocery store and checking at 1 thing at a time in that cinveyer belt boop, and then next boop, and then the next one so it's isolating it, I did a quick experiment on my locla computer first I brought a Mullvad subscription and I tried it with regular Mullvad, downlpad two files at once. Then I flipped on there new protocol that daita and I downloaed file 1 and when I went to do file 2 it was slow waiting for the first one to finish. so there there protocol is purposely isolating it, when that's exactly the opposite of what I'm telling you to do, which is the problem itself that when it's isolated, it becomes much easier to study, and you see they think, that they';re gonna be able toi outsmart the NSA, but at the end of the day, maybe can disguise whar website is but they can't hide, what your actually doing? Like, the way that a website would move throygh Mullvad's protcol compared to, a audio call of webrtc, compared to, streaming of a video, all these different things, would move differetnly in the size and quantity of the packets through Mullvad's protocal, then they would.... under a mixxed system hewre you can't even figure out what's going so Mullvad thinks there gonna outsmart the NSA, they think they're gonna outsmart the CIA, but by isolating the packets, they actually directly head on, try to outcompete with them.

Mullvad's system there it's really being misrepresneted because they're saying oh we're making all the datapckets the saame. But ehy're not really doing that, they're making YOU'RE datapackets spread out. What you're doing, has nothing to do with what the other people on Mullvad are doing, and so Mullvad's thing really only works, if, the more people are using it. And that's the paradox, it's that Mullvad works best, when they centralize all data and power, to themselves. While the system that I'm talking about is engaged assymetric warfare, we can succeed, only with a few people among ourselves.

If you look at there website, they don't list Naster, they list Mastodan, they list Twitter, there happy to get shoutouts from influencers like Odell but they don't want to give anything back the community and soke up as much money as they can, to resell and to 47 just like every other VPN.

People are: "Oh Mullvad there so private they let you route traffic Tor first to hide your IP address", oh yeah? It's that there ending support for OpenVPN, now they are only doing WireGuard which prevents you from doing Tor first. Come on down to M247 route all your traffic? Oh wahtt's that? Your gonn ahide with a different VPN? Oh they use M247 tooo!! And M247 to M247 it's so fast!!! Come down oh but your gonna route yout suff to Sweden? Huh? Oh your so slow snall packets are gonna make you direct what's that, your crossing the NSA tapped ocean cables alone? Exactly like I told not to do in the last episode! Oh yeah the wonder and magic of Sweden. This ois the same Sweden that in the most recent EU chat control debate, just voted to end end-t0-end-encrypted chat companies, noboby can have end-to-end encrypted chat for sale under these Swedish guidelines. Now thankfully Sweden's politicians were not enough to sway the entire European Union but I guess Mullvad doesn't care since they like to use GMAIL! They're renign servers with gmail, giving customers support with gmail, experience the joy the wonder of Google Email! I guess that's better then M247 which uses Cloudflare for there wbesite leaking Mullvad password to the US government, come on down we only the Tor network, recently.

I wanna end this with an old school Chinese expression:

In Sun-Tzu's Art of War he talks about the rock and the river and how although the rock is much more powerful and strong to push against the river, is able errode the power of the rock by flowing with the... the bends and the changes of life.

Ultimately Mullvad's whitepaper seels to slow, and isolate these small packets but by doing so, they... remove, the complexity of life, and instead I say to flow with the times and have as much traffic, pushing and bending through these wires as it's splits through the infrastructure as it travels farther and farther to mroe free juristgistures the rock can hit you hard but at the end the day it is the river that can break free. It's your boy, shadow rebel ccatch you on the flipside.
 
isn't that just all vpns? i don't think mullvad glows
What really matters is if the VPN keeps logs, and in Mullvad's case they've been audited and found to keep no logs. Of course, you can't prove a negative, so it all comes down to trust.

@john5433 The rest of your post is saying Mullvad's DAITA is bad because it needs Mullvad to centralize everything(?) I'm not sure what your point is and I'm also not sure how a decentralized system would be able to overcome the problems of a typical VPN. Regardless, DAITA isn't critical to use Mullvad and if you have such a high need for opsec that calls for it you should be doing your own research anyway.

Also yes, Mullvad support uses Gmail, but email is not a private or secure means of communication and should never be treated as such.
 
Last edited:
giant fuckoff wall of text
If you're really freaked out about their third party providers then use the endpoints with "31337" as the provider as they're Mullvad owned and operated.

You also have the option of multi-hopping (either using SOCKS5 or the multihop port). The way this works with the multihop port is they basically NAT traffic through their network to the desired endpoint, so I can connect to an endpoint in NYC with a port allocated to London and traffic just magically appears in London. For SOCKS5 they have special DNS names and you just connect to those with port 1080. It's all on the servers page and you can also use these SOCKS5 endpoints as DNS resolvers if you don't want to send DNS traffic through the endpoint you're currently connected to.

SOCKS5 is my preferred option though as it's not disruptive to change endpoints and you can do it per-browser if you want. The benefit of either method is that provider A can't see the traffic heading to the Internet, instead it just disappears in a tunnel and pops out somewhere completely different. Even if both ends were the same provider, it'd be very difficult to correlate the traffic.
 
Last edited:
@john5433 The rest of your post is saying Mullvad's DAITA is bad because it needs Mullvad to centralize everything(?) I'm not sure what your point is and I'm also not sure how a decentralized system would be able to overcome the problems of a typical VPN. Regardless, DAITA isn't critical to use Mullvad and if you have such a high need for opsec that calls for it you should be doing your own research anyway.

Also yes, Mullvad support uses Gmail, but email is not a private or secure means of communication and should never be treated as such.
I didn't make the audio thing doebeit, I just wrote a shitty transcript, that's someone else entirely
 
ifent seems to be gone
I have no idea what to make of all this but here's whatever this was from earlier this week.

@Niggler Antics, the account that I previously theorized had been compromised by iFent, DM'd me claiming to be the original account owner that had just recovered their account after receiving a "security lock email":
na1.jpg

Around the same time, Niggler DM'd @Jonkinator regarding the contents of a Skibidi Farms post by iFent that required an account to view, contradicting the claim that this was the original account owner:
na2.png
na3.png
Code:
https://skibidifarms.st/threads/kiwi-%F0%9F%92%8Es.5098
na4.png

Cleaned up contents of the SF post, iFent denying the dox is real:
iFent said:
No bro you have to understand. The youtube account made in 2012 belongs to 15 year old IFent no.
iFent said:
The only shit they've managed to do is get kowalsky to fully cut ties with me LOL

Niggler presents / summarizes this post with:
Niggler Antics said:
The H channel is definitely IFents as the name has now changed to match the fact.
Niggler Antics said:
iFent reveals he is 15 years old whether thats a detrace or not i have no idea. He claims to be 2 at the time "2012 belongs to 15 year old IFent no."
And also mentions "Kowalsky" breaking ties with him over it possibly linked to the PhantomKowalsky channel.

Next, I received another DM from @Niggler Antics, this one containing an admission to being iFent, a reiteration that the Bernard Green dox is false, a claim that he was "betrayed" by the other SF admins, and an offer to send me Fella Farms' database of user information. He also claims that he was able to access the Niggler account because he knew the original account owner IRL.
na5.jpgna6.jpg

Following that, iFent would post and feature this to SF. It reads like a damage control Hail-Mary to me, but who knows.
na7.png
(https://archive.ph/qiTtk)

Then, SF's .onion address went offline, FF came back, seemingly without iFent, and SF's .st address began redirecting to FF again:
na8.png
(https://archive.ph/cc5Xk)

Following the redirect, FF staff claimed that iFent had been fedded, which I doubt given that @Niggler Antics has been online within the last 24-hours:
na9.png (a)
na9a.png (a)



Also, a couple choice posts from Naught following the FF relaunch:
naught1.png (a)
naught2.png (a)
 
Back
Top Bottom