Below is the timeline of events from an online group that is dedicated to eradicating the internet community of the filth that is child pornography.....Some people such as myself find it absolutely disgusting and think that the violators should be prosecuted to the fullest extent of the law but are powerless to do anything about it except let +Karol Oilbhreis know what a great job I think they are doing. I am proud to say that I shared this and hope every single person that reads it does also. Even if it just helps one more site get shut down, then that's a step in the right direction.
Karol Oilbhreis - 10:30 PM (edited) - Public
Operation Darknet
------------------------
Timeline of Events
------------------------
At apprx 8:30 CST while browsing the Hidden Wiki we noticed a section called Hard Candy which was dedicated to links to child pornography. We then removed all links on the website, within 5 minutes the links were edited back in by an admin. For this reason, we will continue to make the Hidden Wiki unavailable.
--
At apprx 8:45 CST we noticed 95% of the child pornography listed on the Hidden Wiki shared a digital fingerprint with the shared hosting server at Freedom Hosting.
--
At apprx 9:00pm CST on October 14, 2011 We identified Freedom Hosting as the host of the largest collection of child pornography on the internet. We then issued a warning to remove the illegal content from their server, which they refused to do.
--
At apprx 11:30pm CST on October 14, 2011 We infiltrated the shared hosting server of Freedom Hosting and shutdown services to all clients due to their lack of action to remove child pornography from their server.
--
At apprx 5:00pm CST on October 15, 2011 Freedom Hosting installed their backups and restored services to their child pornography clients. We then issued multiple warnings to remove all child pornography from their servers, which Freedom Hosting refused to do.
--
At apprx 8:00pm CST on October 15, 2011 despite new security features, we once again infiltrated the shared hosting server at Freedom Hosting and stopped service to all clients.
--
------------------------
Our Statement
------------------------
The owners and operators at Freedom Hosting are openly supporting child pornography and enabling pedophiles to view innocent children, fueling their issues and putting children at risk of abduction, molestation, rape, and death.
For this, Freedom Hosting has been declared #OpDarknet Enemy Number One.
By taking down Freedom Hosting, we are eliminating 40+ child pornography websites, among these is Lolita City, one of the largest child pornography websites to date containing more than 100GB of child pornography.
We will continue to not only crash Freedom Hosting's server, but any other server we find to contain, promote, or support child pornography.
------------------------
Our Demands
------------------------
Our demands are simple. Remove all child pornography content from your servers. Refuse to provide hosting services to any website dealing with child pornography. This statement is not just aimed at Freedom Hosting, but everyone on the internet. It does not matter who you are, if we find you to be hosting, promoting, or supporting child pornography, you will become a target.
------------------------
Images & Misc
------------------------
Dead Server Screenshot: http://i55.tinypic.com/vy9w7k.jpg
--
Freedom Host PR Screenshot: http://i53.tinypic.com/o5qlip.jpg
--
Our Manifesto: Anonymous - Operation Darknet
--
#Antisec | #Anonymous | #FreeTopiary | #AnonOps | #FreeAnons | #OccupyWallSteet | #OWS
We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect us.
------------------------
Server Information
------------------------
phpinfo() of FreedomHosting:
System FreeBSD server 8.2-RELEASE-p3 FreeBSD 8.2-RELEASE-p3 #0: Tue Sep 27 18:45:57 UTC 2011 root@amd64-builder.daemonology.net:/usr/obj/usr/sr c/sys/GENERIC amd64
Build Date Aug 26 2011 03:00:30
Configure Command './configure' '--with-layout=GNU' '--localstatedir=/var' '--with-config-file-scan-dir=/usr/local/etc/php' '--disable-all' '--enable-libxml' '--with-libxml-dir=/usr/local' '--with-pcre-regex=/usr/local' '--with-zlib-dir=/usr' '--program-prefix=' '--disable-cgi' '--with-apxs2=/usr/local/sbin/apxs' '--with-regex=php' '--with-zend-vm=CALL' '--disable-ipv6' '--prefix=/usr/local' '--mandir=/usr/local/man' '--infodir=/usr/local/info/' '--build=amd64-portbld-freebsd8.2'
Server API Apache 2.0 Handler
Virtual Directory Support disabled
Configuration File (php.ini) Path /usr/local/etc
Loaded Configuration File /usr/local/etc/php.ini
Scan this dir for additional .ini files /usr/local/etc/php
Additional .ini files parsed /usr/local/etc/php/extensions.ini
PHP API 20090626
PHP Extension 20090626
Zend Extension 220090626
Zend Extension Build API220090626,NTS
PHP Extension Build API20090626,NTS
Debug Build no
Thread Safety disabled
Zend Memory Manager enabled
Zend Multibyte Support disabled
IPv6 Support disabled
Registered PHP Streams php, file, glob, data, http, ftp, zip, compress.zlib
Registered Stream Socket Transports tcp, udp, unix, udg
Registered Stream Filters convert.iconv.*, string.rot13, string.toupper, string.tolower, string.strip_tags, convert.*, consumed, dechunk, zlib.*
Configuration
apache2handler
Apache Version Apache
Apache API Version 20051115
Server Administrator you@example.com
Hostname:Port xqz3u5drneuzhaeo.onion:0
User/Group www(80)/80
Max Requests Per Child: 10000 - Keep Alive: off - Max Per Connection: 100
Timeouts Connection: 900 - Keep-Alive: 60
Virtual Server Yes
Server Root /usr/local
Loaded Modules core prefork http_core mod_so mod_authz_host mod_file_cache mod_cache mod_disk_cache mod_filter mod_deflate mod_env mod_expires mod_headers mod_setenvif mod_mime mod_status mod_autoindex mod_dir mod_alias mod_rewrite mod_bw mod_php5 mod_alias_basedir mod_vhost_alias_frdmhst
Apache Environment
Variable Value
HTTP_HOST xqz3u5drneuzhaeo.onion
HTTP_CONNECTION close
HTTP_USER_AGENT Mozilla/5.0 (Windows NT 6.1; rv:5.0)
HTTP_ACCEPT text/html,application/xhtml+xml,application/xml;q= 0.9,*/*;q=0.8
HTTP_ACCEPT_LANGUAGE en-us,en;q=0.5
HTTP_ACCEPT_CHARSET ISO-8859-1,utf-8;q=0.7,*;q=0.7
HTTP_DNT 1
HTTP_COOKIE visitz=0; sort=0a
PATH /bin:/usr/bin:/usr/ucb:/usr/bsd:/usr/local/bin
SERV ER_SIGNATURE no value
SERVER_SOFTWARE Apache
SERVER_NAME xqz3u5drneuzhaeo.onion
SERVER_ADDR 10.0.1.2
SERVER_PORT 80
REMOTE_ADDR 10.0.1.2
DOCUMENT_ROOT /home/fh/www
SERVER_ADMIN you@example.com
SCRIPT_FILENAME /home/fh/users/l/i/lolitacity/www/index.php
REMOTE_ PORT 56818
GATEWAY_INTERFACE CGI/1.1
SERVER_PROTOCOL HTTP/1.0
REQUEST_METHOD GET
QUERY_STRING no value
REQUEST_URI /users/lolitacity/index.php
SCRIPT_NAME /users/lolitacity/index.php
------------------------
Timeline of Events
------------------------
At apprx 8:30 CST while browsing the Hidden Wiki we noticed a section called Hard Candy which was dedicated to links to child pornography. We then removed all links on the website, within 5 minutes the links were edited back in by an admin. For this reason, we will continue to make the Hidden Wiki unavailable.
--
At apprx 8:45 CST we noticed 95% of the child pornography listed on the Hidden Wiki shared a digital fingerprint with the shared hosting server at Freedom Hosting.
--
At apprx 9:00pm CST on October 14, 2011 We identified Freedom Hosting as the host of the largest collection of child pornography on the internet. We then issued a warning to remove the illegal content from their server, which they refused to do.
--
At apprx 11:30pm CST on October 14, 2011 We infiltrated the shared hosting server of Freedom Hosting and shutdown services to all clients due to their lack of action to remove child pornography from their server.
--
At apprx 5:00pm CST on October 15, 2011 Freedom Hosting installed their backups and restored services to their child pornography clients. We then issued multiple warnings to remove all child pornography from their servers, which Freedom Hosting refused to do.
--
At apprx 8:00pm CST on October 15, 2011 despite new security features, we once again infiltrated the shared hosting server at Freedom Hosting and stopped service to all clients.
--
------------------------
Our Statement
------------------------
The owners and operators at Freedom Hosting are openly supporting child pornography and enabling pedophiles to view innocent children, fueling their issues and putting children at risk of abduction, molestation, rape, and death.
For this, Freedom Hosting has been declared #OpDarknet Enemy Number One.
By taking down Freedom Hosting, we are eliminating 40+ child pornography websites, among these is Lolita City, one of the largest child pornography websites to date containing more than 100GB of child pornography.
We will continue to not only crash Freedom Hosting's server, but any other server we find to contain, promote, or support child pornography.
------------------------
Our Demands
------------------------
Our demands are simple. Remove all child pornography content from your servers. Refuse to provide hosting services to any website dealing with child pornography. This statement is not just aimed at Freedom Hosting, but everyone on the internet. It does not matter who you are, if we find you to be hosting, promoting, or supporting child pornography, you will become a target.
------------------------
Images & Misc
------------------------
Dead Server Screenshot: http://i55.tinypic.com/vy9w7k.jpg
--
Freedom Host PR Screenshot: http://i53.tinypic.com/o5qlip.jpg
--
Our Manifesto: Anonymous - Operation Darknet
--
#Antisec | #Anonymous | #FreeTopiary | #AnonOps | #FreeAnons | #OccupyWallSteet | #OWS
We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect us.
------------------------
Server Information
------------------------
phpinfo() of FreedomHosting:
System FreeBSD server 8.2-RELEASE-p3 FreeBSD 8.2-RELEASE-p3 #0: Tue Sep 27 18:45:57 UTC 2011 root@amd64-builder.daemonology.net:/usr/obj/usr/sr
Build Date Aug 26 2011 03:00:30
Configure Command './configure' '--with-layout=GNU' '--localstatedir=/var' '--with-config-file-scan-dir=/usr/local/etc/php' '--disable-all' '--enable-libxml' '--with-libxml-dir=/usr/local' '--with-pcre-regex=/usr/local' '--with-zlib-dir=/usr' '--program-prefix=' '--disable-cgi' '--with-apxs2=/usr/local/sbin/apxs' '--with-regex=php' '--with-zend-vm=CALL' '--disable-ipv6' '--prefix=/usr/local' '--mandir=/usr/local/man' '--infodir=/usr/local/info/' '--build=amd64-portbld-freebsd8.2'
Server API Apache 2.0 Handler
Virtual Directory Support disabled
Configuration File (php.ini) Path /usr/local/etc
Loaded Configuration File /usr/local/etc/php.ini
Scan this dir for additional .ini files /usr/local/etc/php
Additional .ini files parsed /usr/local/etc/php/extensions.ini
PHP API 20090626
PHP Extension 20090626
Zend Extension 220090626
Zend Extension Build API220090626,NTS
PHP Extension Build API20090626,NTS
Debug Build no
Thread Safety disabled
Zend Memory Manager enabled
Zend Multibyte Support disabled
IPv6 Support disabled
Registered PHP Streams php, file, glob, data, http, ftp, zip, compress.zlib
Registered Stream Socket Transports tcp, udp, unix, udg
Registered Stream Filters convert.iconv.*, string.rot13, string.toupper, string.tolower, string.strip_tags, convert.*, consumed, dechunk, zlib.*
Configuration
apache2handler
Apache Version Apache
Apache API Version 20051115
Server Administrator you@example.com
Hostname:Port xqz3u5drneuzhaeo.onion:0
User/Group www(80)/80
Max Requests Per Child: 10000 - Keep Alive: off - Max Per Connection: 100
Timeouts Connection: 900 - Keep-Alive: 60
Virtual Server Yes
Server Root /usr/local
Loaded Modules core prefork http_core mod_so mod_authz_host mod_file_cache mod_cache mod_disk_cache mod_filter mod_deflate mod_env mod_expires mod_headers mod_setenvif mod_mime mod_status mod_autoindex mod_dir mod_alias mod_rewrite mod_bw mod_php5 mod_alias_basedir mod_vhost_alias_frdmhst
Apache Environment
Variable Value
HTTP_HOST xqz3u5drneuzhaeo.onion
HTTP_CONNECTION close
HTTP_USER_AGENT Mozilla/5.0 (Windows NT 6.1; rv:5.0)
HTTP_ACCEPT text/html,application/xhtml+xml,application/xml;q=
HTTP_ACCEPT_LANGUAGE en-us,en;q=0.5
HTTP_ACCEPT_CHARSET ISO-8859-1,utf-8;q=0.7,*;q=0.7
HTTP_DNT 1
HTTP_COOKIE visitz=0; sort=0a
PATH /bin:/usr/bin:/usr/ucb:/usr/bsd:/usr/local/bin
SERV
SERVER_SOFTWARE Apache
SERVER_NAME xqz3u5drneuzhaeo.onion
SERVER_ADDR 10.0.1.2
SERVER_PORT 80
REMOTE_ADDR 10.0.1.2
DOCUMENT_ROOT /home/fh/www
SERVER_ADMIN you@example.com
SCRIPT_FILENAME /home/fh/users/l/i/lolitacity/www/index.php
REMOTE_
GATEWAY_INTERFACE CGI/1.1
SERVER_PROTOCOL HTTP/1.0
REQUEST_METHOD GET
QUERY_STRING no value
REQUEST_URI /users/lolitacity/index.php
SCRIPT_NAME /users/lolitacity/index.php
- Comment - Share
+9
7 shares - Joshua Hastings, David Kokua, Gerard van Schip, Jo Jo Beans, Kevin Gault, Trenton Ray and Zac Thomas
4 comments
No comments:
Post a Comment
Thank you for reading my post and commenting, I try and get back to comments within 24-48 hours at most.