diff --git a/content/manifestos-tmp/1992-crypto-anarchist.md b/content/manifestos-tmp/1992-crypto-anarchist.md new file mode 100644 index 0000000..7280359 --- /dev/null +++ b/content/manifestos-tmp/1992-crypto-anarchist.md @@ -0,0 +1,20 @@ +# The Crypto Anarchist Manifesto + +A specter is haunting the modern world, the specter of crypto anarchy. + +Computer technology is on the verge of providing the ability for individuals and groups to communicate and interact with each other in a totally anonymous manner. Two persons may exchange messages, conduct business, and negotiate electronic contracts without ever knowing the True Name, or legal identity, of the other. Interactions over networks will be untraceable, via extensive re- routing of encrypted packets and tamper-proof boxes which implement cryptographic protocols with nearly perfect assurance against any tampering. Reputations will be of central importance, far more important in dealings than even the credit ratings of today. These developments will alter completely the nature of government regulation, the ability to tax and control economic interactions, the ability to keep information secret, and will even alter the nature of trust and reputation. + +The technology for this revolution--and it surely will be both a social and economic revolution--has existed in theory for the past decade. The methods are based upon public-key encryption, zero-knowledge interactive proof systems, and various software protocols for interaction, authentication, and verification. The focus has until now been on academic conferences in Europe and the U.S., conferences monitored closely by the National Security Agency. But only recently have computer networks and personal computers attained sufficient speed to make the ideas practically realizable. And the next ten years will bring enough additional speed to make the ideas economically feasible and essentially unstoppable. High-speed networks, ISDN, tamper-proof boxes, smart cards, satellites, Ku-band transmitters, multi-MIPS personal computers, and encryption chips now under development will be some of the enabling technologies. + +The State will of course try to slow or halt the spread of this technology, citing national security concerns, use of the technology by drug dealers and tax evaders, and fears of societal disintegration. Many of these concerns will be valid; crypto anarchy will allow national secrets to be trade freely and will allow illicit and stolen materials to be traded. An anonymous computerized market will even make possible abhorrent markets for assassinations and extortion. Various criminal and foreign elements will be active users of CryptoNet. But this will not halt the spread of crypto anarchy. + +Just as the technology of printing altered and reduced the power of medieval guilds and the social power structure, so too will cryptologic methods fundamentally alter the nature of corporations and of government interference in economic transactions. Combined with emerging information markets, crypto anarchy will create a liquid market for any and all material which can be put into words and pictures. And just as a seemingly minor invention like barbed wire made possible the fencing-off of vast ranches and farms, thus altering forever the concepts of land and property rights in the frontier West, so too will the seemingly minor discovery out of an arcane branch of mathematics come to be the wire clippers which dismantle the barbed wire around intellectual property. + +Arise, you have nothing to lose but your barbed wire fences! + +--- + +Timothy C. May +22 Nov 1992 + +Source: http://www.activism.net/cypherpunk/crypto-anarchy.html \ No newline at end of file diff --git a/content/manifestos-tmp/1993-cypherpunks.md b/content/manifestos-tmp/1993-cypherpunks.md new file mode 100644 index 0000000..0ff55d7 --- /dev/null +++ b/content/manifestos-tmp/1993-cypherpunks.md @@ -0,0 +1,34 @@ +# A Cypherpunk's Manifesto + +Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world. + +If two parties have some sort of dealings, then each has a memory of their interaction. Each party can speak about their own memory of this; how could anyone prevent it? One could pass laws against it, but the freedom of speech, even more than privacy, is fundamental to an open society; we seek not to restrict any speech at all. If many parties speak together in the same forum, each can speak to all the others and aggregate together knowledge about individuals and other parties. The power of electronic communications has enabled such group speech, and it will not go away merely because we might want it to. + +Since we desire privacy, we must ensure that each party to a transaction have knowledge only of that which is directly necessary for that transaction. Since any information can be spoken of, we must ensure that we reveal as little as possible. In most cases personal identity is not salient. When I purchase a magazine at a store and hand cash to the clerk, there is no need to know who I am. When I ask my electronic mail provider to send and receive messages, my provider need not know to whom I am speaking or what I am saying or what others are saying to me; my provider only need know how to get the message there and how much I owe them in fees. When my identity is revealed by the underlying mechanism of the transaction, I have no privacy. I cannot here selectively reveal myself; I must *always* reveal myself. + +Therefore, privacy in an open society requires anonymous transaction systems. Until now, cash has been the primary such system. An anonymous transaction system is not a secret transaction system. An anonymous system empowers individuals to reveal their identity when desired and only when desired; this is the essence of privacy. + +Privacy in an open society also requires cryptography. If I say something, I want it heard only by those for whom I intend it. If the content of my speech is available to the world, I have no privacy. To encrypt is to indicate the desire for privacy, and to encrypt with weak cryptography is to indicate not too much desire for privacy. Furthermore, to reveal one's identity with assurance when the default is anonymity requires the cryptographic signature. + +We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy out of their beneficence. It is to their advantage to speak of us, and we should expect that they will speak. To try to prevent their speech is to fight against the realities of information. Information does not just want to be free, it longs to be free. Information expands to fill the available storage space. Information is Rumor's younger, stronger cousin; Information is fleeter of foot, has more eyes, knows more, and understands less than Rumor. + +We must defend our own privacy if we expect to have any. We must come together and create systems which allow anonymous transactions to take place. People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers. The technologies of the past did not allow for strong privacy, but electronic technologies do. + +We the Cypherpunks are dedicated to building anonymous systems. We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money. + +Cypherpunks write code. We know that someone has to write software to defend privacy, and since we can't get privacy unless we all do, we're going to write it. We publish our code so that our fellow Cypherpunks may practice and play with it. Our code is free for all to use, worldwide. We don't much care if you don't approve of the software we write. We know that software can't be destroyed and that a widely dispersed system can't be shut down. + +Cypherpunks deplore regulations on cryptography, for encryption is fundamentally a private act. The act of encryption, in fact, removes information from the public realm. Even laws against cryptography reach only so far as a nation's border and the arm of its violence. Cryptography will ineluctably spread over the whole globe, and with it the anonymous transactions systems that it makes possible. + +For privacy to be widespread it must be part of a social contract. People must come and together deploy these systems for the common good. Privacy only extends so far as the cooperation of one's fellows in society. We the Cypherpunks seek your questions and your concerns and hope we may engage you so that we do not deceive ourselves. We will not, however, be moved out of our course because some may disagree with our goals. + +The Cypherpunks are actively engaged in making the networks safer for privacy. Let us proceed together apace. + +Onward. + +--- + +Eric Hughes +9 March 1993 + +Source: http://www.activism.net/cypherpunk/manifesto.html \ No newline at end of file diff --git a/content/manifestos-tmp/2008-anonymous.txt b/content/manifestos-tmp/2008-anonymous.txt new file mode 100644 index 0000000..7d46141 --- /dev/null +++ b/content/manifestos-tmp/2008-anonymous.txt @@ -0,0 +1,21 @@ +# We are Anonymous + + +Knowledge is free. + +We are Anonymous. + +We are Legion. + +We do not forgive. + +We do not forget. + +Expect us. + +--- + +Source: https://www.youtube.com/watch?v=JCbKv9yiLiQ +Date: January 21, 2008 + +On January 21, 2008, a YouTube post set the template for future Anonymous proclamations. The video, in this case criticizing the Church of Scientology, includes the now-common Anonymous sign-off: "Knowledge is free. We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us." \ No newline at end of file diff --git a/content/manifestos-tmp/2011-Days-of-Lulz.txt b/content/manifestos-tmp/2011-Days-of-Lulz.txt new file mode 100644 index 0000000..2677bff --- /dev/null +++ b/content/manifestos-tmp/2011-Days-of-Lulz.txt @@ -0,0 +1,69 @@ +# 50 Days of LulzĀ  + + +. /$$ /$$ /$$$$$$ +.| $$ | $$ /$$__ $$ +.| $$ /$$ /$$| $$ /$$$$$$$$| $$ \__/ /$$$$$$ /$$$$$$$ +.| $$ | $$ | $$| $$|____ /$$/| $$$$$$ /$$__ $$ /$$_____/ +.| $$ | $$ | $$| $$ /$$$$/ \____ $$| $$$$$$$$| $$ +.| $$ | $$ | $$| $$ /$$__/ /$$ \ $$| $$_____/| $$ +.| $$$$$$$$| $$$$$$/| $$ /$$$$$$$$| $$$$$$/| $$$$$$$| $$$$$$.$ +.|________/ \______/ |__/|________/ \______/ \_______/ \_______/ + //Laughing at your security since 2011! + +.-- .-""-. +. ) ( ) +. ( ) ( +. / ) +. (_ _) 0_,-.__ +. (_ )_ |_.-._/ +. ( ) |lulz..\ +. (__) |__--_/ +. |'' ``\ | +. | [Lulz] \ | /b/ +. | \ ,,,---===?A`\ | ,==y' +. ___,,,,,---==""\ |M] \ | ;|\ |> +. _ _ \ ___,|H,,---==""""bno, +. o O (_) (_) \ / _ AWAW/ +. / _(+)_ dMM/ +. \@_,,,,,,---==" \ \\|// MW/ +.--''''" === d/ +. // SET SAIL FOR FAIL! +. ,'_________________________ +. \ \ \ \ ,/~~~~~~~~~~~~~~~~~~~~~~~~~~~ +. _____ ,' ~~~ .-""-.~~~~~~ .-""-. +. .-""-. ///==--- /`-._ ..-' -.__..-' +. `-.__..-' =====\\\\\\ V/ .---\. +. ~~~~~~~~~~~~, _',--/_.\ .-""-. +. .-""-.___` -- \| -.__..- + +Friends around the globe, + +We are Lulz Security, and this is our final release, as today marks something meaningful to us. 50 days ago, we set sail with our humble ship on an uneasy and brutal ocean: the Internet. The hate machine, the love machine, the machine powered by many machines. We are all part of it, helping it grow, and helping it grow on us. + +For the past 50 days we've been disrupting and exposing corporations, governments, often the general population itself, and quite possibly everything in between, just because we could. All to selflessly entertain others - vanity, fame, recognition, all of these things are shadowed by our desire for that which we all love. The raw, uninterrupted, chaotic thrill of entertainment and anarchy. It's what we all crave, even the seemingly lifeless politicians and emotionless, middle-aged self-titled failures. You are not failures. You have not blown away. You can get what you want and you are worth having it, believe in yourself. + +While we are responsible for everything that The Lulz Boat is, we are not tied to this identity permanently. Behind this jolly visage of rainbows and top hats, we are people. People with a preference for music, a preference for food; we have varying taste in clothes and television, we are just like you. Even Hitler and Osama Bin Laden had these unique variations and style, and isn't that interesting to know? The mediocre painter turned supervillain liked cats more than we did. + +Again, behind the mask, behind the insanity and mayhem, we truly believe in the AntiSec movement. We believe in it so strongly that we brought it back, much to the dismay of those looking for more anarchic lulz. We hope, wish, even beg, that the movement manifests itself into a revolution that can continue on without us. The support we've gathered for it in such a short space of time is truly overwhelming, and not to mention humbling. Please don't stop. Together, united, we can stomp down our common oppressors and imbue ourselves with the power and freedom we deserve. + +So with those last thoughts, it's time to say bon voyage. Our planned 50 day cruise has expired, and we must now sail into the distance, leaving behind - we hope - inspiration, fear, denial, happiness, approval, disapproval, mockery, embarrassment, thoughtfulness, jealousy, hate, even love. If anything, we hope we had a microscopic impact on someone, somewhere. Anywhere. + +Thank you for sailing with us. The breeze is fresh and the sun is setting, so now we head for the horizon. + +Let it flow... + +Lulz Security - our crew of six wishes you a happy 2011, and a shout-out to all of our battlefleet members and supporters across the globe + +------------------------------------------------------------------------------------------------------ + +Our mayhem: http://lulzsecurity.com/releases/ +Our chaos: http://thepiratebay.org/user/LulzSec/ +Our final release: http://thepiratebay.org/torrent/6495523/50_Days_of_Lulz + +Please make mirrors of material on the website, because we're not renewing the hosting. Goodbye. <3 + + +--- + +Source: http://pastebin.com/raw/1znEGmHa \ No newline at end of file diff --git a/content/manifestos-tmp/2011-LulzSec.txt b/content/manifestos-tmp/2011-LulzSec.txt new file mode 100644 index 0000000..6942de6 --- /dev/null +++ b/content/manifestos-tmp/2011-LulzSec.txt @@ -0,0 +1,32 @@ +# LulzSec - 1000th tweet statement + +Dear Internets, + +This is Lulz Security, better known as those evil bastards from twitter. We just hit 1000 tweets, and as such we thought it best to have a little chit-chat with our friends (and foes). + +For the past month and a bit, we've been causing mayhem and chaos throughout the Internet, attacking several targets including PBS, Sony, Fox, porn websites, FBI, CIA, the U.S. government, Sony some more, online gaming servers (by request of callers, not by our own choice), Sony again, and of course our good friend Sony. + +While we've gained many, many supporters, we do have a mass of enemies, albeit mainly gamers. The main anti-LulzSec argument suggests that we're going to bring down more Internet laws by continuing our public shenanigans, and that our actions are causing clowns with pens to write new rules for you. But what if we just hadn't released anything? What if we were silent? That would mean we would be secretly inside FBI affiliates right now, inside PBS, inside Sony... watching... abusing... + +Do you think every hacker announces everything they've hacked? We certainly haven't, and we're damn sure others are playing the silent game. Do you feel safe with your Facebook accounts, your Google Mail accounts, your Skype accounts? What makes you think a hacker isn't silently sitting inside all of these right now, sniping out individual people, or perhaps selling them off? You are a peon to these people. A toy. A string of characters with a value. + +This is what you should be fearful of, not us releasing things publicly, but the fact that someone hasn't released something publicly. We're sitting on 200,000 Brink users right now that we never gave out. It might make you feel safe knowing we told you, so that Brink users may change their passwords. What if we hadn't told you? No one would be aware of this theft, and we'd have a fresh 200,000 peons to abuse, completely unaware of a breach. + +Yes, yes, there's always the argument that releasing everything in full is just as evil, what with accounts being stolen and abused, but welcome to 2011. This is the lulz lizard era, where we do things just because we find it entertaining. Watching someone's Facebook picture turn into a penis and seeing their sister's shocked response is priceless. Receiving angry emails from the man you just sent 10 dildos to because he can't secure his Amazon password is priceless. You find it funny to watch havoc unfold, and we find it funny to cause it. We release personal data so that equally evil people can entertain us with what they do with it. + +Most of you reading this love the idea of wrecking someone else's online experience anonymously. It's appealing and unique, there are no two account hijackings that are the same, no two suddenly enraged girlfriends with the same expression when you admit to killing prostitutes from her boyfriend's recently stolen MSN account, and there's certainly no limit to the lulz lizardry that we all partake in on some level. + +And that's all there is to it, that's what appeals to our Internet generation. We're attracted to fast-changing scenarios, we can't stand repetitiveness, and we want our shot of entertainment or we just go and browse something else, like an unimpressed zombie. Nyan-nyan-nyan-nyan-nyan-nyan-nyan-nyan, anyway... + +Nobody is truly causing the Internet to slip one way or the other, it's an inevitable outcome for us humans. We find, we nom nom nom, we move onto something else that's yummier. We've been entertaining you 1000 times with 140 characters or less, and we'll continue creating things that are exciting and new until we're brought to justice, which we might well be. But you know, we just don't give a living fuck at this point - you'll forget about us in 3 months' time when there's a new scandal to gawk at, or a new shiny thing to click on via your 2D light-filled rectangle. People who can make things work better within this rectangle have power over others; the whitehats who charge $10,000 for something we could teach you how to do over the course of a weekend, providing you aren't mentally disabled. + +This is the Internet, where we screw each other over for a jolt of satisfaction. There are peons and lulz lizards; trolls and victims. There's losers that post shit they think matters, and other losers telling them their shit does not matter. In this situation, we are both of these parties, because we're fully aware that every single person that reached this final sentence just wasted a few moments of their time. + +Thank you, bitches. + +Lulz Security + +--- + +Source: http://pastebin.com/HZtH523f +Date: JUN 17TH, 2011 \ No newline at end of file