A message from George Orwell to the Internet #Tor #TOR

Publicado el 26 dic. 2015

Hello friends. Giordano here with a little video I made while you await new content on The Juice Media. Unlike you, George Orwell became highly impatient with the hiatus on the channel and so he made me upload this special announcement about the Internet and your online rights… which he wants you all to heed very, very carefully.

(NB. Despite being a ‘spin-off’, this is not a RAP NEWS video! Apologies in advance to anyone who may feel bitterly, even mortally disappointed by this. Despite that, I hope you find the video promising of things to come on the channel. I am eager to hear what you think. If enough peeps don’t hate on this, I might make more of these in 2016…)

Speaking of 2016, my best wishes to all you fellow Juicers for a healthy and fulfilling new year.


☛ SUPPORT THEJUICEMEDIA: This is an independent, crowd-funded channel. Please consider supporting future content in the following ways:
* Become a patron of the Juice on Patreon:
* Donate via other methods:
* Send Bitcoin to: 1HMPK1zFCLopAvNEvR3aehFU1tSvHeWkTS

* Written by Giordano Nanni.
* Savvy script consultants: D-bot Rawlinson, Adso Ferguson, Jacob Appelbaum.
* George Torwell performed by Giordano; voice performed by Adso Ferguson.
* Music composed by Adrian Sergovich and The Goat Beats (edited version of the RN15 soundtrack).
* Lucy Cahill wielded the camera, directed and assisted with production in her awesome way.
* Special thanks to peeps at the Tor Project for instigating and supporting the production of this video
* English captions created by Koolfy from

* German translation by FL-Bremen
* Serbian translations by Tamara
* Spanish translation by Vitama

If you would like to translate this video into your language, please contact: info @ thejuicemedia . com

* Tor web-browser:…
* Signal Private Messenger for iOS:…
* Signal Private Messenger for Android:…
* Support the Tor Project via this dedicated link:…
* Read about Signal Private Messenger by OpenWhisperSystems:…

ICYMI: George Torwell first appeared via the Juice Channeling Portal in 2012, in episode 15 of Juice Rap News:…



MEDIA CONVENTION Berlin 2014: Out of the Dark

Publicado el 13/5/2014

Jacob Appelbaum, freier Journalist beim SPIEGEL spricht mit Ole Reißmann von SPIEGEL ONLINE über den Stand der Pressefreiheit in Deutschland und den USA, insbesondere in Bezug auf die NSA-Enthüllungen.


Tor Browser Bundle

Tor Browser Bundle, one of the easiest ways to stay anonymous while browsing the web, has received a new update today. The Fourth alpha release in the 3.0 series of the Tor Browser Bundle is now available from the Tor Package Archive, users with older versions are recommended to get it as soon as possible. Latest version updates the Firefox Browser to 17.0.9esr to patch multiple Memory Corruption and Buffer underflow flaws. Also Tor updated to, NoScript Firefox Addon to versions. You can Download Tor Browser Bundle 3.0alpha4 Here.

– See more at:

Jacob Appelbaum videos

Publicado el 11/09/2012 por 

In this Surveillance Teach-In, award-winning filmmaker Laura Poitras is joined by computer security expert and privacy advocate Jacob Appelbaum and National Security Agency whistle-blower Bill Binney to present an artistic and practical commentary on living in the contemporary Panopticon.


Publicado el 04/06/2012 por 

Jacob Appelbaum shares his views on privacy, government surveillance and the current state of democracy with YASSSU at the Re:publica conference 2012 in Berlin

Jacob Appelbaum is an independent computer security researcher and hacker. He is currently employed by the University of Washington, and is a core member of the Tor project. Appelbaum is known for representing Wikileaks at the 2010 Hope conference. He has subsequently been repeatedly targeted by US law enforcement agencies, who obtained a court order for his Twitter account data, detained him 12 times at the US border after trips abroad, and seized a laptop and several mobile phones.



Publicado el 22/05/2012 por 

Re-contextualizing our social interactions in the face of privatisation of data leads us into a space of social responsibility. The impact of our permissive data sharing habits and the economic models that incentivize it is not yet fully understood. How may we ensure that we’re fully informed and consenting to information released or sold about us? How may try we ensure that consent is required? How can we re-contextualize and better come to a shared understanding about transitive risks posed by the surveillance state?





Tor on Android

Android QR code

Orbot: Mobile Anonymity + Circumvention

Gibberbot: Secure Instant Messaging

Orweb: Proxy+Privacy Browser

UDP Tester

Allow to send a datagram to a remote location, and optionally receive a datagram as answer. Main use case is to check that a correct NAT/firewall configuration is setup to access a UDP server from a public address, when there is no possible access to a machine that can call from the outside.

Tags: udptester, udp untuk android, udp tester, udp test android, download udp tester android.

Connect Cat

A Netcat like applilication.
Connect to host and send anything.

– send data interactively
– send data from the file on the strage
– line separator can be specified
– charactercode can be specified

* You need OI FileManager to send a file.

My twetter: @teru_kusu

The Nessus Android.

The Nessus Android app, from Tenable Network Security Inc., enables you to log into your Nessus scanners and start, stop and pause vulnerability scans as well as analyze the results directly from your Android device.

This mobility helps improving the efficiency of your Incident Response process by letting you quickly log into a Nessus scanner from your phone to search previous scan results or check the status of an on-going scan.

(Requires an access to version 4.2 of the Nessus server, or newer)


If you want to support our work financially, you can donate to one of the following organizations in our name, and we’ll make sure it is applied relevantly:

Tor anonymity network and censorship #TOR #Anonimity #Censorship

Subido por el 14/02/2012

Jacob Appelbaum

Jacob Appelbaum











Abstract: Are you interested in how governments and corporations attempt to censor access to the Tor network? Wonder what protocol fingerprints are actually used as protocol distinguishers? This talk will cover some real world examples that the Tor network faces and it will discuss deployed solutions; hopefully we’ll have lots of room for discussion for future development.

Jacob Appelbaum (@ioerror ) is a renowned independent internet security professional, accomplished photographer, software hacker and world traveller. A developer for The Tor Project, Appelbaum trains interested parties globally on how to effectively use and contribute to the Tor network. Since its initial release, Tor has enabled roughly 36 million people around the world to experience freedom of access and expression on the Internet while keeping them in control of their privacy and anonymity. Its network has proved pivotal in dissident movements in both Iran and more recently Egypt.

A driving force in the team behind the creation of the Cold Boot Attacks, Appelbaum won both the Pwnie for Most Innovative Research award and the Usenix Security best student paper award in 2008. Additionally, he was part of the MD5 Collisions Inc. team that created a rogue CA certificate by using a cluster of 200 PlayStations funded by the Swiss taxpayers. The “MD5 considered harmful today” research was awarded the best paper award at CRYPTO 2009.

He is also a staff research scientist at the University of Washington Security and Privacy lab. Appelbaum is also a founding member of the hacklab Noisebridge in San Francisco where he indulges his interests in magnetics, cryptography and consensus based governance.


Laura Poitras: Surveillance Teach-In with Jacob Appelbaum & Bill Binney

Jacob Appelbaum

Jacob Appelbaum














Laura Poitras: Surveillance Teach-In
with Jacob Appelbaum & Special Guests

2012 Biennial: Laura Poitras


Jacob Appelbaum # Digital Anti-Repression Workshop – April 26 2012 #JacobAppelbaum #TOR

Publicado el 27/04/2012 por 

Filmed April 26, 2012, 12pm. Q & A workshop with Jacob Appelbaum, computer security researcher, on mobile phone security, cellphone forensics, state repression and surveillance.



EXCLUSIVE: Jacob Appelbaum (Wikileaks/Tor) on SOPA

EXCLUSIVE: Jacob Appelbaum (Wikileaks/Tor) on SOPA


Interview brought to you by
Jacob Appelbaum of the TOR anonymity network project, wikileaks and the University of Washington speaks about his opinions of the SOPA legislation which was recently put forth to the American Congress (and subsequently caused massive online protests and swiftly pulled from consideration.

He talks about the dangers of such censorship and government power, the issues of the recent Megaupload takedown and how to bypass censorship and state surveillance.

This speech took place at Occupy Melbourne when Jacob Appelbaum came down to speak before the “War on the Internet” conference at Trades Hall.



Tutorial Tor

Un pequeño tutorial de como utilizar tor, el link de descarga,


“Tor” and the “Onion Logo” are registered trademarks of The Tor Project, Inc. Content on this site is licensed under a Creative Commons Attribution 3.0 United States License, unless otherwise noted.


A tale of new censors – Vodafone UK, T-Mobile UK, O2 UK, and T-Mobile USA

The right to read is a fictional story but it warns of a future that has already started to arrive; it paints a picture where information is controlled with a heavy hand and simply reading, let alone speaking is an extremely dangerous activity. In the words of William Gibson, “The future is already here — it’s just not very evenly distributed”. Restrictions on the right to read though the Internet perfectly match this observation. A lot should be said about perceptions of censorship, and it is often thought that places like Syria or Iran are unique. Generally, people in the West hold that those countries obviously censor as is consistent with facts of life in a supposedly non-free country. This probably holds a lot of truth but it absolutely fails to address the core of the issue — these countries and those networks are not unique.

In fact, we find uncensored networks to almost be an abnormal state. The so-called free countries in the West often shape and tamper with network traffic. They often also log data and even collaborate with governments. Generally, people don’t see evidence of this and as a result, they often perceive that their Internet connections aren’t monitored or censored. These days are quickly coming to an end and while it sounds like hyperbole, here are examples in the United Kingdom and in the United States of America.

Recently it has come to our attention that our primary website is filtered by Vodafone in the UK, by 3 ( in the UK, by O2 in the UK, and by T-Mobile in the UK and the USA. It used to be the case that we only saw filtering and censorship events in places like Egypt, Syria, or Iran and now we’re going to explore what those attacks look like in the context of the UK and the USA.