I hate the Internet and the people who own it

Option 4 ; maybe just don't be such hateful transphobic bigots all the time constantly?
Rejected. Network content is irrelevant to network functionality.

@Null is it bad if I sit back and enjoy when these destructive tactics are turned upon other places on the Internet and possibly even the troons themselves?

They really are ripping parts out of the engine.
"Fight fire with fire" is still a good option. We've already seen how much these shitheads shriek when they get themselves banned from Twitter for calling for the death of their enemies while cheering on censorship. A few well-placed outages of the kind they keep hitting the Farms with should get enough attention to provoke a corrective response. I'd absolutely love to see Cloudflare bumped offline for a few hours because someone null-routes some of their subnets, pressures a payment processor to drop them or manages to fuck with their SSL certs or CA.

It wouldn't hurt for that to happen to Long-Gone Dong's company or other personal interests either. Give these scumbags a taste of their own medicine. Leverage the same weaknesses they are. I hope people understand they can pretend to be trannies to pull the same "trick" the real ones are pulling. BTW this also makes people hate trannies even more.

I'd root for seeing the cloud providers take a hit too but they already go down often enough on their own that nobody really needs to do much to encourage that. :story:

The day this all backfires on them is going to be a very sweet day
For sure. I just hope there's enough of a network left to watch them suffer.
 
Last edited:
Freaky development; like the deep web has a lot of heinous stuff on it, but what is basically a tabloids website is too far. I'm at least relieved the site isn't going to just be dropped from onion altogether and not be accessible, but I am floored troons are this much of a protected class that they have THIS much pull in these tech companies. I mean this is insane.
 
your comms will no longer be encrypted if you don't have the cert which is a disaster security wise though, intermediate actors (if they can find your Tor entrance and exit nodes) would theoretically be able to sniff network traffic with a program such as Wireshark and read all of your communications, including passwords in clear text. No bueno. Finding the nodes and sniffing would be really difficult though.

That is only true for accessing a clearnet domain over tor. The clearnet site is obviously not reopened yet and the SSL certs for that haven't been revoked (yet). Access to an onion site is encrypted by design, those long ass addresses also act as the public key . Since you already have the key you don't need a third party to verify the validity of the key, either it leads to the site or it doesn't. Onion sites never leave the tor network so intercepting the data is very hard for someone who isn't the NSA. This concern isn't warranted.

The reason for https on the kf onion site is due to brave (and apparently the forum software) acting unaware of the above. Https isn't necessary for a secure connection, but is necessary for some software to acknowledge the connection is secure. The question is if this extra step of manually accepting the certificate introduces an opportunity for a mam-in-the-middle attacker to get at anything of value. I would think that if your ssl cert to the onion site were compromised there would only be minimal info that could be gathered since the connection is secured by the tor encryption still.

The real issue is most web browsers assume that a self signed cert is due to a security vulnerability because it very well can be and nobody (else) needs to self sign. They give off big scary warnings intended to keep the normies who use the internet from harming themselves. So that warning might scare people off. But I question if it really will, once you've gone down to tor only you're not dealing with people who will turn away at the slightest bit of extra effort required to access the site. The time to give notice means nobody should be surprised to have to accept the new cert.
 
accept a self-signed certificate
You might mean this, but instead of just self-signed, why not just make a KiwiCA cert we can cram into our KF Tor browsers? That's not hard to do , you could keep it secure on your own systems and it allows you to deploy future certs as needed.

(IIRC it would require the exact same effort from people who don't install the cert as a self-signed)
 
You might mean this, but instead of just self-signed, why not just make a KiwiCA cert we can cram into our KF Tor browsers? That's not hard to do , you could keep it secure on your own systems and it allows you to deploy future certs as needed.
Because no OS vendors would include it, google troon telling google not to include it on Android is just plain expected.
That leaves just Linux dudes that use Gentoo or Arch.
 
Because no OS vendors would include it, google troon telling google not to include it on Android is just plain expected.
That leaves just Linux dudes that use Gentoo or Arch.
This is why people don't usually make their own CA certs: Because normies don't understand you don't need the OS vendor to install it for you, you can put them in your own goddamn self.

Every OS supports this, especially mobile, since MDMs are used to install certs so your company can man in the middle your traffic.
 
How big is the site now in terms of storage? I need to know what HDDs I need to get encase the site goes down for good. I already set money aside for two 8TB hard drives to make two backups of the site.

Let it be known to Liz Dong Gone and to all the sex pest freaks that there are people who refuse to let them live down their degeneracy and wrong doings. Even if it is not on the Internet, your dirty neovag-bloody-pussed filled laundry will forever be out there. It will never truly go away and you can be strike down by it at any moment when opportunity allows for it. You will never truly be at rest in the same manner that you will never be a real woman.
 
How big is the site now in terms of storage? I need to know what HDDs I need to get encase the site goes down for good. I already set money aside for two 8TB hard drives to make two backups of the site.

Let it be known to Liz Dong Gone and to all the sex pest freaks that there are people who refuse to let them live down their degeneracy and wrong doings. Even if it is not on the Internet, your dirty neovag-bloody-pussed filled laundry will forever be out there. It will never truly go away and you can be strike down by it at any moment when opportunity allows for it. You will never truly be at rest in the same manner that you will never be a real woman.
I'm beginning to wonder what good any of this does. These people have been chronicled as much as possible yet they are still given power anyway. I think normalfags just don't care if someone is evil & all this info is useless to everyone other than a few enthusiasts.
 
Wow how tech illiterate are people now a days? Chill fellow Kiwi's.
Think how you got here just now.

1. Google TOR or Brave
2. Install TOR or Brave
3. Go to Kiwifarms.net and copy the link at bottom of page.
4. Paste said link into TOR or Brave
5. Log into Kiwifarms
6. Sneed

Realistically we're looking at 3 or 4 extra steps, and those should only need done once. I'm pretty sure everyone here will manage it. Especially since the guide posted by Null for TOR access was easy enough to follow, only downside was the sever being down at the time.
 
You maybe wanna post the fingerprint in advance, to help people avoid getting MITMed by feds? I realize it's paranoia, but it's good opsec imo.
The Tor Onion URL is itself a signature. Tor cannot be MITM'd.

You realize you're talking to Null right? If the feds want to find you he will let them have you.
There is not a single person on this Earth who is going to protect a criminal from the federal government of their jurisdiction. I don't know what's up with your faggot attitude. Every single subpoena I've received from the US has been for overtly criminal behavior.

You might mean this, but instead of just self-signed, why not just make a KiwiCA cert we can cram into our KF Tor browsers? That's not hard to do , you could keep it secure on your own systems and it allows you to deploy future certs as needed.

(IIRC it would require the exact same effort from people who don't install the cert as a self-signed)
It would be much more difficult to do that when there is no purpose.
 
The Tor Onion URL is itself a signature. Tor cannot be MITM'd.


There is not a single person on this Earth who is going to protect a criminal from the federal government of their jurisdiction. I don't know what's up with your faggot attitude.
To say something Null said before but I think needs to be said even plainer:

Tor people usually see https over Tor as kind of redundant. It works, but Tor is already a secure overlay, you go to the .onion and you're talking to the service as sure as if you had a cert you trusted. This isn't 'getting kicked off tor', this is just having a CA cert so Null can work around a Xenforo quirk.
 
Back