• If you enjoy the forum please consider supporting it by signing up for a NES Membership  The benefits pay for the membership many times over.

California confiscation

Whatever way you go about it is a losing situation. There is no best way. The only effective way is impossible to do on your own.
Probably the best way is to get as many of the millions of gun owners to stand together as one. I think that would be very effective. The problem is that doesn't seem likely to happen.
 
Did you watch the video? This happened in CA, so comm2a has nothing to do with it. He also voluntarily let the cops into his garage and cooperated in this confiscation.



I hate to be so blunt but you're a real POS. This "if not me then someone else will do it" and "just doing my job" and "just following orders" mentality is incredibly immoral and unethical. It's the exact same mentality that Nazi guards had - "if I don't put this Jew into the gas chamber then someone else will". It's disgusting and you need to really consider your own morals and ideals because right now you sound like an enemy of the people.

Not such a POS that I would minimize one of the greatest human atrocities by equating it to California gun laws.
 
How is saying that the “just following orders/doing my job” excuse isn’t a valid reason to do something, is minimizing anything?
 
All social media, everything on the internet is NOT anonymous. Please disabuse yourself of that silly notion.

Anonymous social media is totally possible. You just need the personality to never show up on a public IP that's traceable back to you. Burner phone, email in Switzerland, TOR, and a VM running Android OS should do everything you need.
 
Not such a POS that I would minimize one of the greatest human atrocities by equating it to California gun laws.

One of the gratest atrocities of all time was committed by people like you, who thought morality is moot in the face of orders. An atrocity that was committed on an unarmed populous. You're so up your own ass you can't even see that it IS a fair comparison.
 
All social media, everything on the internet is NOT anonymous. Please disabuse yourself of that silly notion.

Lol tell that to the church of scientology I'm sure they'd love to hear that. [rofl] Then again back in those days internet users were much more adept and technically capable at a more common
level. Things like anon.penet.fi were so powerful that cabals orchestrated to shut them down, because it gave people an "anonymous voice" on the internet.

ETA: To this day there are some people that still post stuff like that anonymously on reddit and other websites, likely using the stuff all or in part, of whatluck is talking about above.

-Mike
 
He was also found innocent of all charges in the end even though he admitted to the shooting.
That's how far beyond the pale the jury and judge found the conduct of law enforcement.
I can't think of another case in my lifetime where someone freely admits killing a Federal agent and walks.
That POS jackboot that killed Weaver's son and was justifiably killed by return fire from Kevin Harris has a shrine dedicated to him at the U.S. Marshals office in the Moakley Federal Court House in Boston. Those pukes consider that cold blooded killer to be some kind of martyr and hero!
 
Armed criminals showed up to steal his property. He had three options only.

1. “Let” them steal it and not be kidnapped, and/or injured/killed.

2. Resist with inferior force and be kidnapped or killed. This also results in his property being stolen.

3. Resist with superior force and temporarily prevent his property from being stolen. But unless he has lots of capable and willing friends this will quickly revert into option two, and inferior force.

So with those as your options, saying it was voluntary cooperation when the alternative is prison or death is flat out false.

True.

Which is why ideally in the case of the resisting sheriffs in Washington they would let the state’s attorney general know that if he attempts to enter the county for the purpose of enforcement, then they the sheriffs will deputize every willing gun owner in the county.

:emoji_tiger:
 
Not such a POS that I would minimize one of the greatest human atrocities by equating it to California gun laws.
tenor.gif
 
Anonymous social media is totally possible. You just need the personality to never show up on a public IP that's traceable back to you. Burner phone, email in Switzerland, TOR, and a VM running Android OS should do everything you need.

All those things make it more difficult to trace. But if ‘they’ want to identify you, ‘they’ have the resources to track whatever you posted and tie it to you. Trust me.
 
Trust me.

Interesting. You see, Im a bit of an expert in asymmetrical encryption. Do you have a citation? Afaik only time TOR has been beaten is with

Timing correlation
Or
Endpoint leakage

Both things can be mitigated by using these tools correctly.

If I had info about how to break Tor onionrouting I would be very rich. But I dont. Because you cant.
 
Interesting. You see, Im a bit of an expert in asymmetrical encryption. Do you have a citation? Afaik only time TOR has been beaten is with

Timing correlation
Or
Endpoint leakage

Both things can be mitigated by using these tools correctly.

If I had info about how to break Tor onionrouting I would be very rich. But I dont. Because you cant.

Me? No. I have several friends in the NSA and other places that tell me with great confidence that nothing is private. NOTHING.

Now, they go on to say, that most of the time nobody cares. But when they care....they’ll get it.

I don’t know about TOR onion routing, but if news sources can even be remotely believed, that too Is crackable by a government. If they so choose.

I’m just saying, that even what you say In Your backyard in the sticks isn’t safe. Assume at all times that you’re being monitored in some form or fashion.
 
teaser452 is 100% correct if it’s stored or transmitted electronically, it gets collected by someone. If they really want to know what you are saying to a friend, a laser bounced off the glass window is all they need.

In regards to the Nazi comparisons:

Be advised that the police have been being trained for years to shoot first, always. Look what happened in Houston, look at Mohamed Noor in Minneapolis (he was trained to shoot at threats - even women in PJs), police targets that look like kids and pregnant women.

The Nazi’s didn’t start in the 20’s with gas chambers but over time they got there. Rwanda was a decent country, but over a decade or so it turned into genocide. It just hasn’t happened here yet - but with all the ‘diversity’ we are importing - know it’s on the horizon.
 
Last edited:
Assume at all times that you’re being monitored in some form or fashion.

While this is true, I can't agree with the rest of what you're saying.

You're talking about tracing something that can't be fingerprinted. US spies use this technology to exfiltrate data from places like N Korea and China. We have operatives whose lives depend on this technology. This tech was made by the Naval Research Lab for this exact purpose. To break this shit, you need to break AES256, and if you could do that then every credit card, wire, ATM, bank transaction, every NES or facebook login, every stock market transaction would be compromised. You could move all of the world's money and break the systems that would allow reversal of that transaction. Theoretically AES256 will be broken with string theory AI and supercomputers, but we lack the programming language to define even what that design would look like.

When people say TOR can be broken, I really need more than indirect info. I've been watching this technology very closely, and the people who get caught make other mistakes that exposes them. Not encrypting their cold storage properly, leaving unencrypted backups around, getting raided for another reason and the authorities find evidence of TOR later, using a personal account while on a sensitive TOR circuit, tricking the user into running a javascript trojan, etc. I have never once found an instance where the onion routing is actually reversed. All of these attacks are nullified

If they could break TOR, they would certainly go after the child porn rings, being able to find the servers that run in perverts basements that actually host that trash. But the TOR net makes it so I can have a public server, that's always on, and that can never be found physically.
 
teaser452 is 100% correct if it’s stored or transmitted electronically, it gets collected by someone. If they really want to know what you are saying to a friend, a laser bounced off the glass window is all they need.

In regards to the Nazi comparisons:

Be advised that the police have been being trained for years to shoot first, always. Look what happened in Houston, look at Mohamed Noor in Minneapolis (he was trained to shot at threats - even women in PJs), police targets that look like kids and pregnant women.

The Nazi’s didn’t start in the 20’s with gas chambers but over time they got there. Rwanda was a decent country, but over a decade or so it turned into genocide. It just hasn’t happened here yet - but with all the ‘diversity’ we are importing - know it’s on the horizon.

In the case of TOR, exit traffic can be listened to. Intra-TOR traffic cannot without faking the private keys of EVERY NODE IN THE CHAIN. I'm not talking about taking a million years to break an AES256 key, I'm talking about needing to do that up to 64 times. The only places intra-net traffic are unencrypted are at your endpoint (where you're using a burner laptop and free wifi) and at the receiving server, which if that was compromised you're already in a honeypot anyways. Even if you could listen, you couldn't change a single downstream private key without changing the parity hashes down the line and throwing a huge red flag. In the v3 system, the connection even automatically collapses if this happens, forcing a new handshake with new salts that would reroute all of the traffic through 64-ish new servers.
 
The NSA got caught years ago intercepting laptops and computers in the mail, installing chips, and sending them along.

Don’t forget the reporter who got her computer loaded with spyware (UNDER 0BAMA). Sharyl Attkisson was her name, she lost in court because it would go into the sensitive executive decisions of the White House and beyond the courts power. Remember that with Trump.
 
Burner laptop and full disk encryption with a plausable deniability feature used on public wifi. Use an external firewall to restrict traffic to the tor entrance gateway list and require 2 factor auth to access cold storage if youre paranoid. You cant leverage govt syware when you cant fingerprint the target.
 
Me? No. I have several friends in the NSA and other places that tell me with great confidence that nothing is private. NOTHING.

Now, they go on to say, that most of the time nobody cares. But when they care....they’ll get it.

I don’t know about TOR onion routing, but if news sources can even be remotely believed, that too Is crackable by a government. If they so choose.

I’m just saying, that even what you say In Your backyard in the sticks isn’t safe. Assume at all times that you’re being monitored in some form or fashion.

This works in both directions.
 
If I remember correctly, Kevin Harris killed a U.S. Marshal at Ruby Ridge with a single shot from an Enfield after the Marshal killed Weaver's son. The reports said it was a .30/06 but I believe Enfields are .303 British. Are there any .30/06 Enfields?

Yes, there were. M1917 Enfield was .30-06.
 
Back
Top Bottom