<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://gendersec.tacticaltech.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Alistair</id>
		<title>Gender and Tech Resources - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://gendersec.tacticaltech.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Alistair"/>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php/Special:Contributions/Alistair"/>
		<updated>2026-04-05T14:50:02Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.26.2</generator>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Install_party_free_software_vs_gender_codes&amp;diff=8984</id>
		<title>Install party free software vs gender codes</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Install_party_free_software_vs_gender_codes&amp;diff=8984"/>
				<updated>2017-03-17T12:01:29Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Install party free software vs gender codes&lt;br /&gt;
|Kind of learning session=Gender and Tech&lt;br /&gt;
|Tutorial category=Icebreaking, Discussion&lt;br /&gt;
|Duration (hours)=1-2&lt;br /&gt;
|Learning objectives=- Increase the philosophical and political understanding of free software&lt;br /&gt;
&lt;br /&gt;
- Understand and think about the possible parallels between free software and feminism / radical gender policies&lt;br /&gt;
&lt;br /&gt;
- Learning and sharing concepts around gender&lt;br /&gt;
&lt;br /&gt;
- Meet within a group&lt;br /&gt;
&lt;br /&gt;
- Create a live P2P system&lt;br /&gt;
|Prerequisites=No prerequisite,  the exercise is structured as a way to expand understanding of free software. This activity is good for a new in order to better know each other.&lt;br /&gt;
|Methodology=1) First briefly introduce what is an install party and P2P systems to share data (not mediated by a centralizing server). Ask if participants in the room can explain those concepts with their own words. Then  describe parallels between proprietary software systems where the code is closed and can not be reviewed and modified and heterosexual sex-gender systems (we know how they work but we can not easily change them).&lt;br /&gt;
&lt;br /&gt;
Brief discussion. (10 minutes)&lt;br /&gt;
&lt;br /&gt;
2) Start the install party. Each person writes in post-it's (or in a usb scheme, see document attached)  concepts that have to do with gender, feminism, sexual dissidence, sexuality, or any specific knowledge/skills they can share with another person. A copy of these post-it's / identifiers are listed in a  wall and another on their body. On the other hand every person write a concept, situation, habit they want to remove or un-install (for instance patriarchy, sexism, transphobia etc) . They also stick one copy on their body and another one on the wall. (10 minutes)&lt;br /&gt;
&lt;br /&gt;
Give time to the group to review the different concepts (installing and un-installing) of the wall. Check for repetitions and unify/cluster concepts. (10 minutes)&lt;br /&gt;
&lt;br /&gt;
3) The installation begins. The group has to be divided into two parts, one will be the first &amp;quot;installers&amp;quot; and another of those who will be &amp;quot;installed&amp;quot;. The &amp;quot;installed&amp;quot; group is individually choosing a concept they wish to install /learn and will have to look for the person who has that sign in their body. Every person meet their installer and share information for 5 minutes around that concept. After these 5 minutes the &amp;quot;installed&amp;quot; person can already become &amp;quot;installer&amp;quot; of that concept to other persons, placing the iconographic (or post-it) sign on his body.&lt;br /&gt;
&lt;br /&gt;
It is possible that during the installation several people want to install the same concept at the same time, in that case, they will be able to joining in group where the &amp;quot;installer&amp;quot;  can make a more collective transference.&lt;br /&gt;
&lt;br /&gt;
The dynamic is free and organic, the group accommodates to its own pace.&lt;br /&gt;
&lt;br /&gt;
Although at the beginning it seeks to collect new concepts, it is also interesting to receive concepts that one already knows to learn new edges of it. The installation becomes a situation of exchange, amplification of the understandings and practical experience around the freedoms of free software applied to gender codes.&lt;br /&gt;
&lt;br /&gt;
This dynamic can be extended for about 40-60 minutes.&lt;br /&gt;
&lt;br /&gt;
Finally, a round of evaluation, impressions, learning takes place (10 minutes)&lt;br /&gt;
|Number of facilitators involved=1-2 depending of the size of the group&lt;br /&gt;
|Technical needs=- Post-it's many colours / usb's printed graphs&lt;br /&gt;
&lt;br /&gt;
- Pens or pencils&lt;br /&gt;
&lt;br /&gt;
- You can have a list of concepts previously to suggest (although it would be very strange that they did not emerge naturally). For example: heterosexual; LGTIQ, Sex-gender system; trans, intersexuality, transhackfeminism;,cyberfeminism, gender system, heteronormativity, gender technologies, queer; sexual dissidences, privilege, gender performances, violence, ecosexuality, subversive, dildo, postpornography, tomboy, drag king, sexual work, etc&lt;br /&gt;
|Theoretical and on line resources=One example in Spanish: http://medialab-prado.es/article/install_party_de_conceptos_p2p_degenerado&lt;br /&gt;
&lt;br /&gt;
Install Party definition: https://en.wikipedia.org/wiki/Linux_user_group#Installfests&lt;br /&gt;
&lt;br /&gt;
P2P definition: https://en.wikipedia.org/wiki/Peer-to-peer&lt;br /&gt;
&lt;br /&gt;
[[File:Usbs.pdf]]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Tutorial&lt;br /&gt;
|Title of the tutorial=Install party free software vs gender codes&lt;br /&gt;
|Kind of learning session=Gender and Tech&lt;br /&gt;
|Tutorial category=Icebreaking, Discussion&lt;br /&gt;
|Duration (hours)=1-2&lt;br /&gt;
|Learning objectives=- Increase the philosophical and political understanding of free software&lt;br /&gt;
&lt;br /&gt;
- Understand and think about the possible parallels between free software and feminism / radical gender policies&lt;br /&gt;
&lt;br /&gt;
- Learning and sharing concepts around gender&lt;br /&gt;
&lt;br /&gt;
- Meet within a group&lt;br /&gt;
&lt;br /&gt;
- Create a live P2P system&lt;br /&gt;
|Prerequisites=No prerequisite,  the exercise is structured as a way to increase understanding of free software. This activity is good for a new group to get to know each other.&lt;br /&gt;
|Methodology=1) First briefly explain what an install party is and also explain P2P systems to share data (i.e. not mediated by a central server). Ask if participants in the room can explain those concepts in their own words. Then  describe parallels between proprietary software systems where the code is closed and cannot be reviewed or modified and heterosexual sex-gender systems (we know how they work but we can not easily change them).&lt;br /&gt;
&lt;br /&gt;
Brief discussion. (10 minutes)&lt;br /&gt;
&lt;br /&gt;
2) Start the install party. Each person writes on post-its (or in a usb scheme, see document attached)  concepts that have to do with gender, feminism, sexual dissidence, sexuality, or any specific knowledge/skills they can share with another person. One copy of these post-its / identifiers is posted on a  wall and another on their body. After that every person writes a concept, situation, habit they want to remove or &amp;quot;un-install&amp;quot; (for instance patriarchy, sexism, transphobia etc) . They also stick one copy on their body and another one on the wall. (10 minutes)&lt;br /&gt;
&lt;br /&gt;
Give the group time to review the different concepts (installing and un-installing) on the wall. Check for repetitions and unify/cluster concepts. (10 minutes)&lt;br /&gt;
&lt;br /&gt;
3) The installation begins. The group has to be divided into two groups, one will be the first &amp;quot;installers&amp;quot; and the other group will be &amp;quot;installed&amp;quot;. The people in the &amp;quot;installed&amp;quot; group are individually choosing a concept they wish to install /learn and will have to look for the person who has that post it note on their body. Every person from the &amp;quot;installed&amp;quot; group then talks to their &amp;quot;installer&amp;quot; for 5 minutes. After this 5 minute session the &amp;quot;installed&amp;quot; person can become an &amp;quot;installer&amp;quot; of that concept to other persons, placing the post-it sign on their body.&lt;br /&gt;
&lt;br /&gt;
It is possible that during the installation several people want to install the same concept at the same time. If so, they can form a group where the &amp;quot;installer&amp;quot; can do a group installation.&lt;br /&gt;
&lt;br /&gt;
The dynamic is free and organic, the group adjusts to its own pace.&lt;br /&gt;
&lt;br /&gt;
Although this exercise is mainly about finding out about new concepts, it is also interesting to find new edges  and perspectives to familiar concepts. The installation becomes an opportunity to exchange and amplify the understandings and practical experience around the freedoms of free software applied to gender codes.&lt;br /&gt;
&lt;br /&gt;
This exercise should  last for about 40-60 minutes.&lt;br /&gt;
&lt;br /&gt;
Finish with a round of evaluation, impressions, and learnings (10 minutes)&lt;br /&gt;
|Number of facilitators involved=1-2 depending of the size of the group&lt;br /&gt;
|Requirements=- Post-it's many colours / usb's printed graphs&lt;br /&gt;
&lt;br /&gt;
- Pens or pencils&lt;br /&gt;
&lt;br /&gt;
- You can have a list of concepts previously suggested (although it would be very strange that they did not emerge naturally). For example: heterosexual; LGBTIQ, Sex-gender system; trans, intersexuality, transhackfeminism;,cyberfeminism, gender system, heteronormativity, gender technologies, queer; sexual dissidences, privilege, gender performances, violence, ecosexuality, subversive, dildo, postpornography, tomboy, drag king, sexual work, etc&lt;br /&gt;
|Theoretical and on line resources=One example in Spanish: http://medialab-prado.es/article/install_party_de_conceptos_p2p_degenerado&lt;br /&gt;
&lt;br /&gt;
Install Party definition: https://en.wikipedia.org/wiki/Linux_user_group#Installfests&lt;br /&gt;
&lt;br /&gt;
P2P definition: https://en.wikipedia.org/wiki/Peer-to-peer&lt;br /&gt;
&lt;br /&gt;
[[File:Usbs.pdf]]&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Deep_web&amp;diff=8983</id>
		<title>Deep web</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Deep_web&amp;diff=8983"/>
				<updated>2017-03-17T11:33:22Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== What is the deep web??==&lt;br /&gt;
&lt;br /&gt;
The deep web refers to all the information that is in the world wide we but is not indexed so it is not possible to access it using search engines like Google &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Deep_web&amp;lt;/ref&amp;gt;. Web indexing (or Internet indexing) refers to various methods for indexing the contents of a website or of the Internet as a whole. Individual websites or intranets may use a back-of-the-book index, while search engines usually use keywords and metadata to provide a more useful vocabulary for Internet or onsite searching. With the increase in the number of periodicals that have articles online, web indexing is also becoming important for periodical websites  &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Web_indexing&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:deep_web.png|400px|center|alt=Web profunda]]&lt;br /&gt;
&lt;br /&gt;
According to the wikipedia &amp;quot;The portion of the web that is indexed by standard search engines is known as the surface web. As of 2001, the deep web was several orders of magnitude larger than the surface web. An analogy of an iceberg used by Denis Shestakov represents the division between surface web and deep web respectively: It is impossible to measure, and harsh to put estimates on, the size of the deep web because the majority of the information is hidden or locked inside databases. Early estimates suggested that the deep web is 400 to 550 times larger than the surface web. However, since more information and sites are always being added, it can be assumed that the deep web is growing exponentially at a rate that cannot be quantified.”&lt;br /&gt;
&lt;br /&gt;
A common confusions is to mix up the deep web and the dark web. Latter corresponds to a part of the deep web, which besides not being indexed has been hidden using methods such as masking IP and/or requiring special permissions or the use of specific software to access it &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Dark_web&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
But if it is not indexed, how do we access it? Below we describe two ways you can immerse yourself in the deep web.&lt;br /&gt;
&lt;br /&gt;
== Navigating the deep web using Tor==&lt;br /&gt;
&lt;br /&gt;
[[File:Tor-logo-2011-flat.svg|120px|left|alt=TOR]]&lt;br /&gt;
&lt;br /&gt;
One of the easiest ways is to use the  hidden service protocol TOR &amp;lt;ref&amp;gt;https://www.torproject.org/docs/hidden-services.html.en&amp;lt;/ref&amp;gt; that operates within the anonymous distributed network of TOR &amp;lt;ref&amp;gt;https://www.torproject.org/about/overview.html.en#thesolution&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
Considering the wide variety of users and type of information that you can find inside the deep web, it is initially easier and safer to access it using the  '''TOR browser''' &amp;lt;Ref&amp;gt; https://www.torproject.org/projects/torbrowser.html.en &amp;lt;/ ref&amp;gt; that is available for various operating systems. Alternatively to maximize your security we recommend the use of '''TAILS''' &amp;lt;ref&amp;gt;https://tails.boum.org/&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Maybe you can ask yourself  if it is not indexed where to start?&lt;br /&gt;
&lt;br /&gt;
===Case A===&lt;br /&gt;
You get an .onion address. Those are “.onion is a special-use top level domain suffix designating an anonymous hidden service reachable via the Tor network. Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed, Internet programs such as web browsers can access sites with .onion addresses by sending the request through the network of Tor servers. The purpose of using such a system is to make both the information provider and the person accessing the information more difficult to trace, whether by one another, by an intermediate network host, or by an outsider  &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/.onion&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
For instance, you receive:&lt;br /&gt;
 http://duskgytldkxiuqc6.onion&lt;br /&gt;
you need to change the  .onion for something like:&lt;br /&gt;
&lt;br /&gt;
.onion.to&lt;br /&gt;
&lt;br /&gt;
.onion.city&lt;br /&gt;
&lt;br /&gt;
.onion.cab&lt;br /&gt;
&lt;br /&gt;
or any other domain made available by the network of volunteers of TOR2web  &amp;lt;ref&amp;gt;https://tor2web.org/&amp;lt;/ref&amp;gt;.  &lt;br /&gt;
&lt;br /&gt;
and you need to open it up in the browser '''TOR'''.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
Deep_web2.png|Opening duskgytldkxiuqc6.onion in a common browser&lt;br /&gt;
Deep_web3.png|Opening duskgytldkxiuqc6.onion.to with TOR browser&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Case B===&lt;br /&gt;
&lt;br /&gt;
You want to look for a page.&lt;br /&gt;
&lt;br /&gt;
You can begin in:&lt;br /&gt;
http://deepweb.pw/&lt;br /&gt;
&lt;br /&gt;
This page could be opened in any browser but only using '''TOR''' browser you will be able to access  .onion pages. &lt;br /&gt;
&lt;br /&gt;
There you can find interesting sites like the Hidden wiki.&lt;br /&gt;
&lt;br /&gt;
You can also look for information here:&lt;br /&gt;
 https://ahmia.fi/search/&lt;br /&gt;
&lt;br /&gt;
Or if you are interested in websites about leaks:&lt;br /&gt;
 https://en.wikipedia.org/wiki/GlobaLeaks#Implementations&lt;br /&gt;
&lt;br /&gt;
Other possible search places:&lt;br /&gt;
 http://3g2upl4pq6kufc4m.onion/&lt;br /&gt;
&lt;br /&gt;
 https://www.reddit.com//r/onions&lt;br /&gt;
&lt;br /&gt;
You should consider that the availability of information in many cases is temporary, so you will need to spend considerable time to get used to the deep web and search more fruitfully. Also the language can be a limitation and before entering forums remember that they generally use specific jargon&amp;lt;ref&amp;gt;http://domekit.cc/survival-kit-in-the-deep-web/&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
===Case C===&lt;br /&gt;
You can also use the hidden services of Riseup&lt;br /&gt;
 https://help.riseup.net/en/tor&lt;br /&gt;
&lt;br /&gt;
==Adding data to the deep web==&lt;br /&gt;
&lt;br /&gt;
Well now you surf the web deep but how do you add information?&lt;br /&gt;
&lt;br /&gt;
If you need to add a file you can use the services '' Share '' of Riseup that let you upload a file up to 50mb for no more than a week. You can find the .onion.to league at:  https://help.riseup.net/en/tor&lt;br /&gt;
&lt;br /&gt;
[[File:Deep_web4.png|400px|center|alt= Riseup Services]]&lt;br /&gt;
&lt;br /&gt;
The second option is using zeronet.io. This tool allows you to publish open, free and uncensored blogs and it uses the Bitcoin cryptography and the BitTorrent network.&lt;br /&gt;
&lt;br /&gt;
Although you can use this tool in different operating systems the option we recommend is '''zeronet + TAILS'''  (https://tails.boum.org/) because it represents the safest form, however it requires that you dedicate a little more time to its configuration since you must know how to enable ports in the internet modem.&lt;br /&gt;
&lt;br /&gt;
[[File:zeronet_logo.png|120px|none|alt=zeronet.io|ZeroNet]] &lt;br /&gt;
&lt;br /&gt;
What do you need?&lt;br /&gt;
&lt;br /&gt;
One USB with TAILS and persistencia activated.&lt;br /&gt;
&lt;br /&gt;
Enable the port  15441 of your modem&lt;br /&gt;
&lt;br /&gt;
1) You have login to a TAILS session using persistence and advanced settings to access the ''root'' terminal.&lt;br /&gt;
&lt;br /&gt;
2) In the terminal you need to write the following commands:&lt;br /&gt;
&lt;br /&gt;
To update and install the required dependencies:&lt;br /&gt;
&lt;br /&gt;
 $ sudo apt-get update&lt;br /&gt;
 $ sudo apt-get upgrade&lt;br /&gt;
 $ sudo apt-get install python-msgpack python-gevent&lt;br /&gt;
&lt;br /&gt;
For downloading zeronet:&lt;br /&gt;
&lt;br /&gt;
 $ wget https://github.com/HelloZeroNet/ZeroNet/archive/master.tar.gz&lt;br /&gt;
&lt;br /&gt;
To unzip the downloaded file:&lt;br /&gt;
&lt;br /&gt;
 $ tar xvpfz master.tar.gz&lt;br /&gt;
&lt;br /&gt;
To enter the file:&lt;br /&gt;
&lt;br /&gt;
 $ cd ZeroNet-master&lt;br /&gt;
&lt;br /&gt;
For starting:&lt;br /&gt;
&lt;br /&gt;
 $ python zeronet.py&lt;br /&gt;
&lt;br /&gt;
If this option does not work you need to check your IP&lt;br /&gt;
&lt;br /&gt;
 $ sudo ifconfig&lt;br /&gt;
&lt;br /&gt;
This command will tell you what your internet address (inet addr), for example in the image it is 10.14.241.166&lt;br /&gt;
[[File:ifconfig.png|400px|center|alt=Comando ifconfig]] &lt;br /&gt;
&lt;br /&gt;
 $ python zeronet.py --proxy 127.0.0.1:9050 --tor disable --ui_ip inet_addr&lt;br /&gt;
In the previous command you must replace inet_addr with the one that corresponds to your computer&lt;br /&gt;
&lt;br /&gt;
With those steps you will have started the services of zeronet&lt;br /&gt;
&lt;br /&gt;
3) In the browser '''TOR''' you need to open the ptions of '''Configuration''' and select ''Advanced'' where you will find the tab  '''Network''' and in the first point you need to go to '''Connection'''  '''Options''' and add in '''No proxi''' 127.0.0.1 or your own inet_addr&lt;br /&gt;
&lt;br /&gt;
[[File:Proxy_conf_tor.png|400px|center|alt=Configuration options for the TOR browser]]&lt;br /&gt;
&lt;br /&gt;
After you can open/&lt;br /&gt;
 http://inet_addr:43110/&lt;br /&gt;
for instance:&lt;br /&gt;
 http://127.0.0.1:43110&lt;br /&gt;
&lt;br /&gt;
And you will find the graphical interface&lt;br /&gt;
&lt;br /&gt;
[[File:zeronet.png|400px]]&lt;br /&gt;
&lt;br /&gt;
To create a new blog you only need to activate '''Zero blog''' and use the tool for cloning.&lt;br /&gt;
[[File:Zeronet2.png|400px]] &lt;br /&gt;
&lt;br /&gt;
'''Note:'''&lt;br /&gt;
&lt;br /&gt;
You will only be able to upload information to the network zeronet if your port 15441 is enabled&lt;br /&gt;
You can see more information about set up and configuration here [https://github.com/HelloZeroNet/ZeroNet ZeroNet]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== What is the deep web??==&lt;br /&gt;
&lt;br /&gt;
The deep web refers to all the information that is in the world wide web but is not indexed, so not accessible using search engines such as Google &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Deep_web&amp;lt;/ref&amp;gt;. Web indexing (or Internet indexing) refers to various methods for indexing the contents of a website or of the entire Internet. Individual websites or intranets may use a &amp;quot;back-of-the-book&amp;quot; index, while search engines usually use keywords and metadata to provide a more useful vocabulary for Internet or on-site searching. With the increase in the number of periodicals that have articles online, web indexing is also becoming important for periodical websites  &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Web_indexing&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:deep_web.png|400px|center|alt=Web profunda]]&lt;br /&gt;
&lt;br /&gt;
According to Wikipedia, &amp;quot;The portion of the web that is indexed by standard search engines is known as the surface web. As of 2001, the deep web was several orders of magnitude larger than the surface web. An analogy of an iceberg used by Denis Shestakov represents the division between surface web and deep web respectively: It is impossible to measure, and harsh to put estimates on, the size of the deep web because the majority of the information is hidden or locked inside databases. Early estimates suggested that the deep web is 400 to 550 times larger than the surface web. However, since more information and sites are always being added, it can be assumed that the deep web is growing exponentially at a rate that cannot be quantified.”&lt;br /&gt;
&lt;br /&gt;
A common confusions is to mix up the deep web and the dark web; the latter corresponds to a part of the deep web, which besides not being indexed, has been hidden using methods such as masking the IP address and/or requiring special permissions or the use of specific software to access it &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Dark_web&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
But if the deep web is visible, how do we access it? Below we describe two ways you can immerse yourself in the deep web.&lt;br /&gt;
&lt;br /&gt;
== Navigating the deep web using Tor==&lt;br /&gt;
&lt;br /&gt;
[[File:Tor-logo-2011-flat.svg|120px|left|alt=TOR]]&lt;br /&gt;
&lt;br /&gt;
One of the easiest ways is to use the  hidden service protocol TOR &amp;lt;ref&amp;gt;https://www.torproject.org/docs/hidden-services.html.en&amp;lt;/ref&amp;gt; that operates within the anonymous distributed TOR network &amp;lt;ref&amp;gt;https://www.torproject.org/about/overview.html.en#thesolution&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
Considering the wide variety of users and type of information that you can find inside the deep web, using the  '''TOR browser''' is normally the easiest and safest method &amp;lt;Ref&amp;gt; https://www.torproject.org/projects/torbrowser.html.en &amp;lt;/ ref&amp;gt;, and is available for various operating systems. Alternatively, for optimum security we recommend '''TAILS''' &amp;lt;ref&amp;gt;https://tails.boum.org/&amp;lt;/ref&amp;gt;, which is a highly secure version of Linux you boot on your computer from a USB stick or other external device..&lt;br /&gt;
&lt;br /&gt;
But if it the deep web is not indexed how do navigate it?&lt;br /&gt;
&lt;br /&gt;
===Case A===&lt;br /&gt;
You find a website with a .onion address. “.onion&amp;quot; is a special-use top level domain suffix designating an anonymous hidden service only reachable via the Tor network. These addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root. But with the appropriate proxy software installed, Internet programs such as web browsers can access sites with .onion addresses by sending the request through the network of Tor servers. The purpose of using such a system is to make both the information provider and the person accessing the information more difficult to trace, whether by one another, by an intermediate network host, or by an outsider  &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/.onion&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
For instance, you receive:&lt;br /&gt;
 http://duskgytldkxiuqc6.onion&lt;br /&gt;
you need to change the  .onion for something like:&lt;br /&gt;
&lt;br /&gt;
.onion.to&lt;br /&gt;
&lt;br /&gt;
.onion.city&lt;br /&gt;
&lt;br /&gt;
.onion.cab&lt;br /&gt;
&lt;br /&gt;
or any other domain made available by the network of volunteers of TOR2web  &amp;lt;ref&amp;gt;https://tor2web.org/&amp;lt;/ref&amp;gt;.  &lt;br /&gt;
&lt;br /&gt;
and you need to open it up in the browser '''TOR'''.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
Deep_web2.png|Opening duskgytldkxiuqc6.onion in a common browser&lt;br /&gt;
Deep_web3.png|Opening duskgytldkxiuqc6.onion.to with TOR browser&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Case B===&lt;br /&gt;
&lt;br /&gt;
You want to look for a page.&lt;br /&gt;
&lt;br /&gt;
You can begin with:&lt;br /&gt;
http://deepweb.pw/&lt;br /&gt;
&lt;br /&gt;
This page can be opened in any browser, but you can only access .onion pages using the '''TOR''' browser. &lt;br /&gt;
&lt;br /&gt;
Here you can find interesting sites like the Hidden wiki.&lt;br /&gt;
&lt;br /&gt;
You can also look for information here:&lt;br /&gt;
 https://ahmia.fi/search/&lt;br /&gt;
&lt;br /&gt;
Or if you are interested in websites about leaks:&lt;br /&gt;
 https://en.wikipedia.org/wiki/GlobaLeaks#Implementations&lt;br /&gt;
&lt;br /&gt;
Other possible search places:&lt;br /&gt;
 http://3g2upl4pq6kufc4m.onion/&lt;br /&gt;
&lt;br /&gt;
 https://www.reddit.com//r/onions&lt;br /&gt;
&lt;br /&gt;
You should consider that the availability of information in many cases is temporary, so you will need to spend some time to getting used to the deep web so you can search more fruitfully. Also,  language can be a limitation; before entering forums remember that they generally use specific jargon&amp;lt;ref&amp;gt;http://domekit.cc/survival-kit-in-the-deep-web/&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
===Case C===&lt;br /&gt;
You can also use the hidden services of Riseup&lt;br /&gt;
 https://help.riseup.net/en/tor&lt;br /&gt;
&lt;br /&gt;
==Adding data to the deep web==&lt;br /&gt;
&lt;br /&gt;
Now you can surf the deep web, but how do you add information?&lt;br /&gt;
&lt;br /&gt;
If you need to add a file you can use the Riseup '' Share '' service that lets you upload a file of up to 50mb for no more than a week. You can find the .onion.to league at:  https://help.riseup.net/en/tor&lt;br /&gt;
&lt;br /&gt;
[[File:Deep_web4.png|400px|center|alt= Riseup Services]]&lt;br /&gt;
&lt;br /&gt;
The second option is using zeronet.io. This tool allows you to publish open, free and uncensored blogs and it uses Bitcoin cryptography and the BitTorrent network.&lt;br /&gt;
&lt;br /&gt;
Although you can use this tool with different operating systems, the safest method and the option we recommend is '''zeronet + TAILS'''  (https://tails.boum.org/). However, with this approach you need to dedicate a little more time to its configuration since you must know how to enable ports on an internet modem.&lt;br /&gt;
&lt;br /&gt;
[[File:zeronet_logo.png|120px|none|alt=zeronet.io|ZeroNet]] &lt;br /&gt;
&lt;br /&gt;
What do you need?&lt;br /&gt;
&lt;br /&gt;
One TAILS USB with persistence activated.&lt;br /&gt;
&lt;br /&gt;
Enable the port  15441 of your modem&lt;br /&gt;
&lt;br /&gt;
1) Login to a TAILS session using persistence and advanced settings to access the ''root'' terminal.&lt;br /&gt;
&lt;br /&gt;
2) In the terminal you need to write the following commands:&lt;br /&gt;
&lt;br /&gt;
- To update and install the required applications:&lt;br /&gt;
&lt;br /&gt;
 $ sudo apt-get update&lt;br /&gt;
 $ sudo apt-get upgrade&lt;br /&gt;
 $ sudo apt-get install python-msgpack python-gevent&lt;br /&gt;
&lt;br /&gt;
For downloading zeronet:&lt;br /&gt;
&lt;br /&gt;
 $ wget https://github.com/HelloZeroNet/ZeroNet/archive/master.tar.gz&lt;br /&gt;
&lt;br /&gt;
To unzip the downloaded file:&lt;br /&gt;
&lt;br /&gt;
 $ tar xvpfz master.tar.gz&lt;br /&gt;
&lt;br /&gt;
To enter the file:&lt;br /&gt;
&lt;br /&gt;
 $ cd ZeroNet-master&lt;br /&gt;
&lt;br /&gt;
For starting:&lt;br /&gt;
&lt;br /&gt;
 $ python zeronet.py&lt;br /&gt;
&lt;br /&gt;
If this option does not work you need to check your IP&lt;br /&gt;
&lt;br /&gt;
 $ sudo ifconfig&lt;br /&gt;
&lt;br /&gt;
This command will tell you your internet address (inet addr), for example in the image it is 10.14.241.166&lt;br /&gt;
[[File:ifconfig.png|400px|center|alt=Comando ifconfig]] &lt;br /&gt;
&lt;br /&gt;
 $ python zeronet.py --proxy 127.0.0.1:9050 --tor disable --ui_ip inet_addr&lt;br /&gt;
In the previous command you must replace inet_addr with the one that corresponds to your computer&lt;br /&gt;
&lt;br /&gt;
You should now have successfully started Zeronet&lt;br /&gt;
&lt;br /&gt;
3) In the browser '''TOR''' you need to open the options of '''Configuration''' and select ''Advanced'' where you will find the tab  '''Network''' and in the first point you need to go to '''Connection'''  '''Options''' and add in '''No proxy''' 127.0.0.1 or your own inet_addr&lt;br /&gt;
&lt;br /&gt;
[[File:Proxy_conf_tor.png|400px|center|alt=Configuration options for the TOR browser]]&lt;br /&gt;
&lt;br /&gt;
After you can open/&lt;br /&gt;
 http://inet_addr:43110/&lt;br /&gt;
for instance:&lt;br /&gt;
 http://127.0.0.1:43110&lt;br /&gt;
&lt;br /&gt;
And you will find the graphical interface&lt;br /&gt;
&lt;br /&gt;
[[File:zeronet.png|400px]]&lt;br /&gt;
&lt;br /&gt;
To create a new blog you only need to activate '''Zero blog''' and use the tool for cloning.&lt;br /&gt;
[[File:Zeronet2.png|400px]] &lt;br /&gt;
&lt;br /&gt;
'''Note:'''&lt;br /&gt;
&lt;br /&gt;
You will only be able to upload information to the network zeronet if your port 15441 is enabled&lt;br /&gt;
You can see more information about set up and configuration here [https://github.com/HelloZeroNet/ZeroNet ZeroNet]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Deep_web&amp;diff=8982</id>
		<title>Deep web</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Deep_web&amp;diff=8982"/>
				<updated>2017-03-17T11:20:00Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== What is the deep web??==&lt;br /&gt;
&lt;br /&gt;
The deep web refers to all the information that is in the world wide we but is not indexed so it is not possible to access it using search engines like Google &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Deep_web&amp;lt;/ref&amp;gt;. Web indexing (or Internet indexing) refers to various methods for indexing the contents of a website or of the Internet as a whole. Individual websites or intranets may use a back-of-the-book index, while search engines usually use keywords and metadata to provide a more useful vocabulary for Internet or onsite searching. With the increase in the number of periodicals that have articles online, web indexing is also becoming important for periodical websites  &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Web_indexing&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:deep_web.png|400px|center|alt=Web profunda]]&lt;br /&gt;
&lt;br /&gt;
According to the wikipedia &amp;quot;The portion of the web that is indexed by standard search engines is known as the surface web. As of 2001, the deep web was several orders of magnitude larger than the surface web. An analogy of an iceberg used by Denis Shestakov represents the division between surface web and deep web respectively: It is impossible to measure, and harsh to put estimates on, the size of the deep web because the majority of the information is hidden or locked inside databases. Early estimates suggested that the deep web is 400 to 550 times larger than the surface web. However, since more information and sites are always being added, it can be assumed that the deep web is growing exponentially at a rate that cannot be quantified.”&lt;br /&gt;
&lt;br /&gt;
A common confusions is to mix up the deep web and the dark web. Latter corresponds to a part of the deep web, which besides not being indexed has been hidden using methods such as masking IP and/or requiring special permissions or the use of specific software to access it &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Dark_web&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
But if it is not indexed, how do we access it? Below we describe two ways you can immerse yourself in the deep web.&lt;br /&gt;
&lt;br /&gt;
== Navigating the deep web using Tor==&lt;br /&gt;
&lt;br /&gt;
[[File:Tor-logo-2011-flat.svg|120px|left|alt=TOR]]&lt;br /&gt;
&lt;br /&gt;
One of the easiest ways is to use the  hidden service protocol TOR &amp;lt;ref&amp;gt;https://www.torproject.org/docs/hidden-services.html.en&amp;lt;/ref&amp;gt; that operates within the anonymous distributed network of TOR &amp;lt;ref&amp;gt;https://www.torproject.org/about/overview.html.en#thesolution&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
Considering the wide variety of users and type of information that you can find inside the deep web, it is initially easier and safer to access it using the  '''TOR browser''' &amp;lt;Ref&amp;gt; https://www.torproject.org/projects/torbrowser.html.en &amp;lt;/ ref&amp;gt; that is available for various operating systems. Alternatively to maximize your security we recommend the use of '''TAILS''' &amp;lt;ref&amp;gt;https://tails.boum.org/&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Maybe you can ask yourself  if it is not indexed where to start?&lt;br /&gt;
&lt;br /&gt;
===Case A===&lt;br /&gt;
You get an .onion address. Those are “.onion is a special-use top level domain suffix designating an anonymous hidden service reachable via the Tor network. Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed, Internet programs such as web browsers can access sites with .onion addresses by sending the request through the network of Tor servers. The purpose of using such a system is to make both the information provider and the person accessing the information more difficult to trace, whether by one another, by an intermediate network host, or by an outsider  &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/.onion&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
For instance, you receive:&lt;br /&gt;
 http://duskgytldkxiuqc6.onion&lt;br /&gt;
you need to change the  .onion for something like:&lt;br /&gt;
&lt;br /&gt;
.onion.to&lt;br /&gt;
&lt;br /&gt;
.onion.city&lt;br /&gt;
&lt;br /&gt;
.onion.cab&lt;br /&gt;
&lt;br /&gt;
or any other domain made available by the network of volunteers of TOR2web  &amp;lt;ref&amp;gt;https://tor2web.org/&amp;lt;/ref&amp;gt;.  &lt;br /&gt;
&lt;br /&gt;
and you need to open it up in the browser '''TOR'''.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
Deep_web2.png|Opening duskgytldkxiuqc6.onion in a common browser&lt;br /&gt;
Deep_web3.png|Opening duskgytldkxiuqc6.onion.to with TOR browser&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Case B===&lt;br /&gt;
&lt;br /&gt;
You want to look for a page.&lt;br /&gt;
&lt;br /&gt;
You can begin in:&lt;br /&gt;
http://deepweb.pw/&lt;br /&gt;
&lt;br /&gt;
This page could be opened in any browser but only using '''TOR''' browser you will be able to access  .onion pages. &lt;br /&gt;
&lt;br /&gt;
There you can find interesting sites like the Hidden wiki.&lt;br /&gt;
&lt;br /&gt;
You can also look for information here:&lt;br /&gt;
 https://ahmia.fi/search/&lt;br /&gt;
&lt;br /&gt;
Or if you are interested in websites about leaks:&lt;br /&gt;
 https://en.wikipedia.org/wiki/GlobaLeaks#Implementations&lt;br /&gt;
&lt;br /&gt;
Other possible search places:&lt;br /&gt;
 http://3g2upl4pq6kufc4m.onion/&lt;br /&gt;
&lt;br /&gt;
 https://www.reddit.com//r/onions&lt;br /&gt;
&lt;br /&gt;
You should consider that the availability of information in many cases is temporary, so you will need to spend considerable time to get used to the deep web and search more fruitfully. Also the language can be a limitation and before entering forums remember that they generally use specific jargon&amp;lt;ref&amp;gt;http://domekit.cc/survival-kit-in-the-deep-web/&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
===Case C===&lt;br /&gt;
You can also use the hidden services of Riseup&lt;br /&gt;
 https://help.riseup.net/en/tor&lt;br /&gt;
&lt;br /&gt;
==Adding data to the deep web==&lt;br /&gt;
&lt;br /&gt;
Well now you surf the web deep but how do you add information?&lt;br /&gt;
&lt;br /&gt;
If you need to add a file you can use the services '' Share '' of Riseup that let you upload a file up to 50mb for no more than a week. You can find the .onion.to league at:  https://help.riseup.net/en/tor&lt;br /&gt;
&lt;br /&gt;
[[File:Deep_web4.png|400px|center|alt= Riseup Services]]&lt;br /&gt;
&lt;br /&gt;
The second option is using zeronet.io. This tool allows you to publish open, free and uncensored blogs and it uses the Bitcoin cryptography and the BitTorrent network.&lt;br /&gt;
&lt;br /&gt;
Although you can use this tool in different operating systems the option we recommend is '''zeronet + TAILS'''  (https://tails.boum.org/) because it represents the safest form, however it requires that you dedicate a little more time to its configuration since you must know how to enable ports in the internet modem.&lt;br /&gt;
&lt;br /&gt;
[[File:zeronet_logo.png|120px|none|alt=zeronet.io|ZeroNet]] &lt;br /&gt;
&lt;br /&gt;
What do you need?&lt;br /&gt;
&lt;br /&gt;
One USB with TAILS and persistencia activated.&lt;br /&gt;
&lt;br /&gt;
Enable the port  15441 of your modem&lt;br /&gt;
&lt;br /&gt;
1) You have login to a TAILS session using persistence and advanced settings to access the ''root'' terminal.&lt;br /&gt;
&lt;br /&gt;
2) In the terminal you need to write the following commands:&lt;br /&gt;
&lt;br /&gt;
To update and install the required dependencies:&lt;br /&gt;
&lt;br /&gt;
 $ sudo apt-get update&lt;br /&gt;
 $ sudo apt-get upgrade&lt;br /&gt;
 $ sudo apt-get install python-msgpack python-gevent&lt;br /&gt;
&lt;br /&gt;
For downloading zeronet:&lt;br /&gt;
&lt;br /&gt;
 $ wget https://github.com/HelloZeroNet/ZeroNet/archive/master.tar.gz&lt;br /&gt;
&lt;br /&gt;
To unzip the downloaded file:&lt;br /&gt;
&lt;br /&gt;
 $ tar xvpfz master.tar.gz&lt;br /&gt;
&lt;br /&gt;
To enter the file:&lt;br /&gt;
&lt;br /&gt;
 $ cd ZeroNet-master&lt;br /&gt;
&lt;br /&gt;
For starting:&lt;br /&gt;
&lt;br /&gt;
 $ python zeronet.py&lt;br /&gt;
&lt;br /&gt;
If this option does not work you need to check your IP&lt;br /&gt;
&lt;br /&gt;
 $ sudo ifconfig&lt;br /&gt;
&lt;br /&gt;
This command will tell you what your internet address (inet addr), for example in the image it is 10.14.241.166&lt;br /&gt;
[[File:ifconfig.png|400px|center|alt=Comando ifconfig]] &lt;br /&gt;
&lt;br /&gt;
 $ python zeronet.py --proxy 127.0.0.1:9050 --tor disable --ui_ip inet_addr&lt;br /&gt;
In the previous command you must replace inet_addr with the one that corresponds to your computer&lt;br /&gt;
&lt;br /&gt;
With those steps you will have started the services of zeronet&lt;br /&gt;
&lt;br /&gt;
3) In the browser '''TOR''' you need to open the ptions of '''Configuration''' and select ''Advanced'' where you will find the tab  '''Network''' and in the first point you need to go to '''Connection'''  '''Options''' and add in '''No proxi''' 127.0.0.1 or your own inet_addr&lt;br /&gt;
&lt;br /&gt;
[[File:Proxy_conf_tor.png|400px|center|alt=Configuration options for the TOR browser]]&lt;br /&gt;
&lt;br /&gt;
After you can open/&lt;br /&gt;
 http://inet_addr:43110/&lt;br /&gt;
for instance:&lt;br /&gt;
 http://127.0.0.1:43110&lt;br /&gt;
&lt;br /&gt;
And you will find the graphical interface&lt;br /&gt;
&lt;br /&gt;
[[File:zeronet.png|400px]]&lt;br /&gt;
&lt;br /&gt;
To create a new blog you only need to activate '''Zero blog''' and use the tool for cloning.&lt;br /&gt;
[[File:Zeronet2.png|400px]] &lt;br /&gt;
&lt;br /&gt;
'''Note:'''&lt;br /&gt;
&lt;br /&gt;
You will only be able to upload information to the network zeronet if your port 15441 is enabled&lt;br /&gt;
You can see more information about set up and configuration here [https://github.com/HelloZeroNet/ZeroNet ZeroNet]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== What is the deep web??==&lt;br /&gt;
&lt;br /&gt;
The deep web refers to all the information that is in the world wide web but is not indexed, so not accessible using search engines such as Google &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Deep_web&amp;lt;/ref&amp;gt;. Web indexing (or Internet indexing) refers to various methods for indexing the contents of a website or of the entire Internet. Individual websites or intranets may use a &amp;quot;back-of-the-book&amp;quot; index, while search engines usually use keywords and metadata to provide a more useful vocabulary for Internet or on-site searching. With the increase in the number of periodicals that have articles online, web indexing is also becoming important for periodical websites  &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Web_indexing&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:deep_web.png|400px|center|alt=Web profunda]]&lt;br /&gt;
&lt;br /&gt;
According to Wikipedia, &amp;quot;The portion of the web that is indexed by standard search engines is known as the surface web. As of 2001, the deep web was several orders of magnitude larger than the surface web. An analogy of an iceberg used by Denis Shestakov represents the division between surface web and deep web respectively: It is impossible to measure, and harsh to put estimates on, the size of the deep web because the majority of the information is hidden or locked inside databases. Early estimates suggested that the deep web is 400 to 550 times larger than the surface web. However, since more information and sites are always being added, it can be assumed that the deep web is growing exponentially at a rate that cannot be quantified.”&lt;br /&gt;
&lt;br /&gt;
A common confusions is to mix up the deep web and the dark web; the latter corresponds to a part of the deep web, which besides not being indexed, has been hidden using methods such as masking the IP address and/or requiring special permissions or the use of specific software to access it &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Dark_web&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
But if it is not indexed, how do we access it? Below we describe two ways you can immerse yourself in the deep web.&lt;br /&gt;
&lt;br /&gt;
== Navigating the deep web using Tor==&lt;br /&gt;
&lt;br /&gt;
[[File:Tor-logo-2011-flat.svg|120px|left|alt=TOR]]&lt;br /&gt;
&lt;br /&gt;
One of the easiest ways is to use the  hidden service protocol TOR &amp;lt;ref&amp;gt;https://www.torproject.org/docs/hidden-services.html.en&amp;lt;/ref&amp;gt; that operates within the anonymous distributed TOR network &amp;lt;ref&amp;gt;https://www.torproject.org/about/overview.html.en#thesolution&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
Considering the wide variety of users and type of information that you can find inside the deep web, using the  '''TOR browser''' is normally the easiest and safest method &amp;lt;Ref&amp;gt; https://www.torproject.org/projects/torbrowser.html.en &amp;lt;/ ref&amp;gt;, and is available for various operating systems. Alternatively, for optimum security we recommend '''TAILS''' &amp;lt;ref&amp;gt;https://tails.boum.org/&amp;lt;/ref&amp;gt;, which is a highly secure version of Linux you boot on your computer from a USB stick or other external device..&lt;br /&gt;
&lt;br /&gt;
But if it is not indexed where do you start?&lt;br /&gt;
&lt;br /&gt;
===Case A===&lt;br /&gt;
You get a .onion address. “.onion&amp;quot; is a special-use top level domain suffix designating an anonymous hidden service only reachable via the Tor network. These addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed, Internet programs such as web browsers can access sites with .onion addresses by sending the request through the network of Tor servers. The purpose of using such a system is to make both the information provider and the person accessing the information more difficult to trace, whether by one another, by an intermediate network host, or by an outsider  &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/.onion&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
For instance, you receive:&lt;br /&gt;
 http://duskgytldkxiuqc6.onion&lt;br /&gt;
you need to change the  .onion for something like:&lt;br /&gt;
&lt;br /&gt;
.onion.to&lt;br /&gt;
&lt;br /&gt;
.onion.city&lt;br /&gt;
&lt;br /&gt;
.onion.cab&lt;br /&gt;
&lt;br /&gt;
or any other domain made available by the network of volunteers of TOR2web  &amp;lt;ref&amp;gt;https://tor2web.org/&amp;lt;/ref&amp;gt;.  &lt;br /&gt;
&lt;br /&gt;
and you need to open it up in the browser '''TOR'''.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
Deep_web2.png|Opening duskgytldkxiuqc6.onion in a common browser&lt;br /&gt;
Deep_web3.png|Opening duskgytldkxiuqc6.onion.to with TOR browser&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Case B===&lt;br /&gt;
&lt;br /&gt;
You want to look for a page.&lt;br /&gt;
&lt;br /&gt;
You can begin with:&lt;br /&gt;
http://deepweb.pw/&lt;br /&gt;
&lt;br /&gt;
This page can be opened in any browser, but you can only access .onion pages using the '''TOR''' browser. &lt;br /&gt;
&lt;br /&gt;
Here you can find interesting sites like the Hidden wiki.&lt;br /&gt;
&lt;br /&gt;
You can also look for information here:&lt;br /&gt;
 https://ahmia.fi/search/&lt;br /&gt;
&lt;br /&gt;
Or if you are interested in websites about leaks:&lt;br /&gt;
 https://en.wikipedia.org/wiki/GlobaLeaks#Implementations&lt;br /&gt;
&lt;br /&gt;
Other possible search places:&lt;br /&gt;
 http://3g2upl4pq6kufc4m.onion/&lt;br /&gt;
&lt;br /&gt;
 https://www.reddit.com//r/onions&lt;br /&gt;
&lt;br /&gt;
You should consider that the availability of information in many cases is temporary, so you will need to spend some time to getting used to the deep web so you search more fruitfully. Also,  language can be a limitation; before entering forums remember that they generally use specific jargon&amp;lt;ref&amp;gt;http://domekit.cc/survival-kit-in-the-deep-web/&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
===Case C===&lt;br /&gt;
You can also use the hidden services of Riseup&lt;br /&gt;
 https://help.riseup.net/en/tor&lt;br /&gt;
&lt;br /&gt;
==Adding data to the deep web==&lt;br /&gt;
&lt;br /&gt;
Now you can surf the deep web, but how do you add information?&lt;br /&gt;
&lt;br /&gt;
If you need to add a file you can use the Riseup '' Share '' service that lets you upload a file of up to 50mb for no more than a week. You can find the .onion.to league at:  https://help.riseup.net/en/tor&lt;br /&gt;
&lt;br /&gt;
[[File:Deep_web4.png|400px|center|alt= Riseup Services]]&lt;br /&gt;
&lt;br /&gt;
The second option is using zeronet.io. This tool allows you to publish open, free and uncensored blogs and it uses Bitcoin cryptography and the BitTorrent network.&lt;br /&gt;
&lt;br /&gt;
Although you can use this tool with different operating systems, the option we recommend is '''zeronet + TAILS'''  (https://tails.boum.org/) as the safest method. However, with this approach you need to dedicate a little more time to its configuration since you must know how to enable ports on an internet modem.&lt;br /&gt;
&lt;br /&gt;
[[File:zeronet_logo.png|120px|none|alt=zeronet.io|ZeroNet]] &lt;br /&gt;
&lt;br /&gt;
What do you need?&lt;br /&gt;
&lt;br /&gt;
One TAILS USB with persistence activated.&lt;br /&gt;
&lt;br /&gt;
Enable the port  15441 of your modem&lt;br /&gt;
&lt;br /&gt;
1) Login to a TAILS session using persistence and advanced settings to access the ''root'' terminal.&lt;br /&gt;
&lt;br /&gt;
2) In the terminal you need to write the following commands:&lt;br /&gt;
&lt;br /&gt;
- To update and install the required applications:&lt;br /&gt;
&lt;br /&gt;
 $ sudo apt-get update&lt;br /&gt;
 $ sudo apt-get upgrade&lt;br /&gt;
 $ sudo apt-get install python-msgpack python-gevent&lt;br /&gt;
&lt;br /&gt;
For downloading zeronet:&lt;br /&gt;
&lt;br /&gt;
 $ wget https://github.com/HelloZeroNet/ZeroNet/archive/master.tar.gz&lt;br /&gt;
&lt;br /&gt;
To unzip the downloaded file:&lt;br /&gt;
&lt;br /&gt;
 $ tar xvpfz master.tar.gz&lt;br /&gt;
&lt;br /&gt;
To enter the file:&lt;br /&gt;
&lt;br /&gt;
 $ cd ZeroNet-master&lt;br /&gt;
&lt;br /&gt;
For starting:&lt;br /&gt;
&lt;br /&gt;
 $ python zeronet.py&lt;br /&gt;
&lt;br /&gt;
If this option does not work you need to check your IP&lt;br /&gt;
&lt;br /&gt;
 $ sudo ifconfig&lt;br /&gt;
&lt;br /&gt;
This command will tell you your internet address (inet addr), for example in the image it is 10.14.241.166&lt;br /&gt;
[[File:ifconfig.png|400px|center|alt=Comando ifconfig]] &lt;br /&gt;
&lt;br /&gt;
 $ python zeronet.py --proxy 127.0.0.1:9050 --tor disable --ui_ip inet_addr&lt;br /&gt;
In the previous command you must replace inet_addr with the one that corresponds to your computer&lt;br /&gt;
&lt;br /&gt;
You should now have successfully started Zeronet&lt;br /&gt;
&lt;br /&gt;
3) In the browser '''TOR''' you need to open the options of '''Configuration''' and select ''Advanced'' where you will find the tab  '''Network''' and in the first point you need to go to '''Connection'''  '''Options''' and add in '''No proxi''' 127.0.0.1 or your own inet_addr&lt;br /&gt;
&lt;br /&gt;
[[File:Proxy_conf_tor.png|400px|center|alt=Configuration options for the TOR browser]]&lt;br /&gt;
&lt;br /&gt;
After you can open/&lt;br /&gt;
 http://inet_addr:43110/&lt;br /&gt;
for instance:&lt;br /&gt;
 http://127.0.0.1:43110&lt;br /&gt;
&lt;br /&gt;
And you will find the graphical interface&lt;br /&gt;
&lt;br /&gt;
[[File:zeronet.png|400px]]&lt;br /&gt;
&lt;br /&gt;
To create a new blog you only need to activate '''Zero blog''' and use the tool for cloning.&lt;br /&gt;
[[File:Zeronet2.png|400px]] &lt;br /&gt;
&lt;br /&gt;
'''Note:'''&lt;br /&gt;
&lt;br /&gt;
You will only be able to upload information to the network zeronet if your port 15441 is enabled&lt;br /&gt;
You can see more information about set up and configuration here [https://github.com/HelloZeroNet/ZeroNet ZeroNet]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Detect_false_mobile_antennas&amp;diff=8981</id>
		<title>Detect false mobile antennas</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Detect_false_mobile_antennas&amp;diff=8981"/>
				<updated>2017-03-17T11:18:40Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== The electromagnetic spectrum ==&lt;br /&gt;
The electromagnetic spectrum or electric radio spectrum is not something material, but the space that is in the air that goes from the ground to the highest part of the sky. In this space, bands frequencies through which airplanes, wi-fi, bluetooth, walkie talkies, radios, telephones communicate are organized. The fact that our phones can be 2G, 3G, 4G means that they are using different bands of the electromagnetic space, through which the information circulates.&lt;br /&gt;
&lt;br /&gt;
For more information about the electromagnetic space:&lt;br /&gt;
https://imagine.gsfc.nasa.gov/science/toolbox/emspectrum1.html&lt;br /&gt;
https://en.wikipedia.org/wiki/Electromagnetic_spectrum&lt;br /&gt;
&lt;br /&gt;
== What is a fake cell tower?==&lt;br /&gt;
Fake cell towers (also known as IMSI catcher) are devices designed to intercept the traffic of a mobile phone and track the movements of the user's phone &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IMSI-catcher &amp;lt;/ref&amp;gt; pretending to be a &amp;quot;legitimate&amp;quot; cell tower &amp;lt;ref&amp;gt;https://www.eff.org/sls/tech/cell-site-simulators &amp;lt;/ref&amp;gt;.&lt;br /&gt;
[[File:Imsi-catcher.png|thumb|none|alt=Esquema torre falsa.|Esquema de una torre falsa de celular (modificado de [http://cybernc.com/les-imsi-catchers/ Henri-Olivier]).]]&lt;br /&gt;
&lt;br /&gt;
By the way they work IMSI catcher are considered a &amp;quot;man in the middle&amp;quot; attack &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Man-in-the-middle_attack&amp;lt;/ref&amp;gt;. This is defined as an attack that acquires the ability to read, insert and modify at will, messages between two parties without any of them knowing that the link between them has been violated. The attacker should be able to observe and intercept messages between the two victims &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IntermediateAccess &amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There is evidence that such devices have been used for surveillance purposes, for example in Ukraine the mobile phones of those attending a large demonstration were tracked and then massively received a text message stating &amp;quot;Dear subscriber, you have been registered As a participant in a mass disturbance &amp;quot;&amp;lt;ref&amp;gt;https://antivigilancia.org/es/2015/06/la-vigilancia-y-la-protesta-social/ &amp;lt;/ref&amp;gt;. In Latin America, it is known that governments like Mexico and Colombia have bought such devices.&lt;br /&gt;
&lt;br /&gt;
Unfortunately fake cell towers are becoming easier to get and their price can be as low as $ 500. Depending on the model there is evidence that not only can intercept the traffic of a phone but also can also inject malware.&lt;br /&gt;
&lt;br /&gt;
'''Bold text'''==How to detect them? ==&lt;br /&gt;
&lt;br /&gt;
A first step would be to have a database of the &amp;quot;legitimate&amp;quot; cell towers and the list of legitimate companies that provide these services and have the necessary operating permits. There are some databases such as:  http://opencellid.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Opencell.png|thumbnail|center|Torres en en América Latina]]&lt;br /&gt;
&lt;br /&gt;
There is also information about the frequencies where they should operate:&lt;br /&gt;
http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
[[File:Frecuencia.png|thumbnail|center|63/5000&lt;br /&gt;
Example of frequencies in which cellular telephony can operate]]&lt;br /&gt;
&lt;br /&gt;
And you can have a look at the development of the GSM network:&lt;br /&gt;
 http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
There are also some applications that can be downloaded from the following free app repository:&lt;br /&gt;
F-Droid is a software repository (or &amp;quot;app store&amp;quot;) for Android applications, similar to the Google Play store. The main repository, hosted by the project, contains only apps which are free software. Applications can be browsed and installed from the F-Droid website or client app without the need to register for an account. &amp;quot;Anti-features&amp;quot; such as advertising, user tracking, or dependence on non-free software are flagged in app descriptions.[3] The website also offers the source code of applications it hosts as well as the software running the F-Droid server, allowing anyone to set up their own app repository.&lt;br /&gt;
&lt;br /&gt;
In order to detect possible false antennas, you can download from F-Droid the following applications:&lt;br /&gt;
&lt;br /&gt;
[http://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/ Android IMSI Catcher Detector]&lt;br /&gt;
&lt;br /&gt;
[[File:AIMSICD-Teaser.png|400px|thumbnail|center|AIMSICD]]&lt;br /&gt;
&lt;br /&gt;
Android IMSI Catcher Detector attempts to detect IMSI-Catchers through detection methods such as: Check Tower Information Consistency,   Check LAC/Cell ID Consistency, check Neighbouring Cell Info, prevent silent app installations, monitor Signal Strength, detect silent SMS and detect FemtoCells&lt;br /&gt;
&lt;br /&gt;
[https://opensource.srlabs.de/projects/snoopsnitch Snoopsnitch]&lt;br /&gt;
&lt;br /&gt;
[[File:Sc catcher hour.png|200px|thumbnail|center|Snoopsnitch]]&lt;br /&gt;
&lt;br /&gt;
SnoopSnitch is an Android app that collects and analyzes mobile radio data to make you aware of your mobile network security and to warn you about threats like fake base stations (IMSI catchers), user tracking and over-the-air updates. With SnoopSnitch you can use the data collected in the GSM Security Map at gsmmap.org and contribute your own data to GSM Map.  This application currently only works on Android phones with a Qualcomm chipset and a stock Android ROM (or a suitable custom ROM with Qualcomm DIAG driver). It requires root priviliges to capture mobile network data.&lt;br /&gt;
&lt;br /&gt;
== How to protect yourself from fake cell towers?==&lt;br /&gt;
&lt;br /&gt;
If your phone allows it you can change its configuration options so that it does not connect to all available cell towers. For example on an Android phone you can go to: Configuration &amp;gt;   Wireless and networks  &amp;gt; More configuration &amp;gt; Mobile networks and there you can change &amp;gt; Network preferences  GSM/UTMS for using 3G or 4G if your smart-phone allows it and also choose for &amp;gt; Network operators &amp;gt; Choosing manually the antennas to connect. &lt;br /&gt;
&lt;br /&gt;
You can also isolate your mobile using a Faraday phone pouch, please read this other tutorial on the topic &amp;lt;ref&amp;gt;https://gendersec.tacticaltech.org/wiki/index.php/Faraday_Phone_Pouch&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
-Tela_y_proceso_de_bolsa_por_killyourphone-com.jpg|Phone Pouch&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Where can I see more information?==&lt;br /&gt;
&lt;br /&gt;
http://wiki.labomedia.org/index.php/GSM&lt;br /&gt;
https://quematumovil.pimienta.org/los_imsi-catchers.html&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== The electromagnetic spectrum ==&lt;br /&gt;
The electromagnetic spectrum or electric radio spectrum is not something material, but the air space that goes from the ground to the highest part of the atmosphere. In this space, frequency bands are organized, through which airplanes, wi-fi, bluetooth, walkie talkies, radios, telephones communicate, for example 2G, 3G, 4G phone networks use different bands of the electromagnetic space, through which data is transmitted. &lt;br /&gt;
&lt;br /&gt;
For more information about the electromagnetic space:&lt;br /&gt;
https://imagine.gsfc.nasa.gov/science/toolbox/emspectrum1.html&lt;br /&gt;
https://en.wikipedia.org/wiki/Electromagnetic_spectrum&lt;br /&gt;
&lt;br /&gt;
== What is a fake cell tower?==&lt;br /&gt;
Fake cell towers (also known as IMSI catchers) are devices designed to intercept the traffic of a mobile phone and track the movements of the user's phone &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IMSI-catcher &amp;lt;/ref&amp;gt; pretending to be a &amp;quot;legitimate&amp;quot; cell tower &amp;lt;ref&amp;gt;https://www.eff.org/sls/tech/cell-site-simulators &amp;lt;/ref&amp;gt;.&lt;br /&gt;
[[File:Imsi-catcher.png|thumb|none|alt=Esquema torre falsa.|Esquema de una torre falsa de celular (modificado de [http://cybernc.com/les-imsi-catchers/ Henri-Olivier]).]]&lt;br /&gt;
&lt;br /&gt;
From the way they work IMSI catchers are considered to execute &amp;quot;man in the middle&amp;quot; attacks &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Man-in-the-middle_attack&amp;lt;/ref&amp;gt;. This is defined as an attack that acquires the ability to read, insert and modify at will, messages between two parties without either of them knowing that the link between them has been compromised. The attacker should be able to observe and intercept messages between the two victims &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IntermediateAccess &amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There is evidence that such devices have been used for surveillance purposes, for example in Ukraine the mobile phones of those attending a large demonstration were tracked and then received a mass text message stating: &amp;quot;Dear subscriber, you have been registered As a participant in a mass disturbance &amp;quot;&amp;lt;ref&amp;gt;https://antivigilancia.org/es/2015/06/la-vigilancia-y-la-protesta-social/ &amp;lt;/ref&amp;gt;. In Latin America, it is known that governments, such as Mexico and Colombia, have bought such devices.&lt;br /&gt;
&lt;br /&gt;
Unfortunately fake cell towers are becoming easier to get and their price can be as low as 500 USD. Depending on the model there is evidence that IMSI catchers can not only can intercept phone traffic, but also can also inject malware.&lt;br /&gt;
&lt;br /&gt;
'''Bold text'''==How to detect them? ==&lt;br /&gt;
&lt;br /&gt;
A first step is to have a database of the &amp;quot;legitimate&amp;quot; cell towers and the list of legitimate companies that provide these services with the necessary operating permits. Some of these databases exist, such as:  http://opencellid.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Opencell.png|thumbnail|center|Torres en en América Latina]]&lt;br /&gt;
&lt;br /&gt;
There is also information available about the frequencies on which they should operate:&lt;br /&gt;
http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
[[File:Frecuencia.png|thumbnail|center|63/5000&lt;br /&gt;
Example of frequencies on which cellular networks can operate]]&lt;br /&gt;
&lt;br /&gt;
And you can have a look at the development of the GSM network:&lt;br /&gt;
 http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
There are also some applications that can be downloaded from the following free app repository:&lt;br /&gt;
F-Droid is a software repository (or &amp;quot;app store&amp;quot;) for Android applications, similar to the Google Play store. The main repository, hosted by the project, contains only apps which are free software. Applications can be browsed and installed from the F-Droid website or client app without the need to register for an account. &amp;quot;Anti-features&amp;quot; such as advertising, user tracking, or dependence on non-free software are flagged in app descriptions.[3] The website also offers the source code of applications it hosts as well as the software running the F-Droid server, allowing anyone to set up their own app repository.&lt;br /&gt;
&lt;br /&gt;
In order to detect possible false antennas, you can download from F-Droid the following applications:&lt;br /&gt;
&lt;br /&gt;
[http://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/ Android IMSI Catcher Detector]&lt;br /&gt;
&lt;br /&gt;
[[File:AIMSICD-Teaser.png|400px|thumbnail|center|AIMSICD]]&lt;br /&gt;
&lt;br /&gt;
Android IMSI Catcher Detector attempts to detect IMSI-Catchers through detection methods such as: Check Tower Information Consistency,   Check LAC/Cell ID Consistency, check neighbouring cell info, prevent silent app installations, monitor Signal Strength, detect silent SMS and detect FemtoCells&lt;br /&gt;
&lt;br /&gt;
[https://opensource.srlabs.de/projects/snoopsnitch Snoopsnitch]&lt;br /&gt;
&lt;br /&gt;
[[File:Sc catcher hour.png|200px|thumbnail|center|Snoopsnitch]]&lt;br /&gt;
&lt;br /&gt;
SnoopSnitch is an Android app that collects and analyzes mobile radio data to make you aware of your mobile network security and to warn you about threats such as fake base stations (IMSI catchers), user tracking and over-the-air updates. With SnoopSnitch you can use the data collected in the GSM Security Map at gsmmap.org and contribute your own data to GSM Map.  This application currently only works on Android phones with a Qualcomm chipset and a stock Android ROM (or a suitable custom ROM with Qualcomm DIAG driver). It requires root priviliges to capture mobile network data.&lt;br /&gt;
&lt;br /&gt;
== How to protect yourself from fake cell towers?==&lt;br /&gt;
&lt;br /&gt;
If your phone allows it you can change its configuration options so that it does not connect to all available cell towers. For example on an Android phone you can go to: Configuration &amp;gt;   Wireless and networks  &amp;gt; More configuration &amp;gt; Mobile networks and there you can change &amp;gt; Network preferences  GSM/UTMS for using 3G or 4G if your smart-phone allows it and also choose for &amp;gt; Network operators &amp;gt; Choosing manually the antennas to connect. &lt;br /&gt;
&lt;br /&gt;
You can also isolate your mobile using a Faraday phone pouch, please read this other tutorial on the topic &amp;lt;ref&amp;gt;https://gendersec.tacticaltech.org/wiki/index.php/Faraday_Phone_Pouch&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
-Tela_y_proceso_de_bolsa_por_killyourphone-com.jpg|Phone Pouch&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Where can I see more information?==&lt;br /&gt;
&lt;br /&gt;
http://wiki.labomedia.org/index.php/GSM&lt;br /&gt;
https://quematumovil.pimienta.org/los_imsi-catchers.html&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== The electromagnetic spectrum ==&lt;br /&gt;
The electromagnetic spectrum or electric radio spectrum is not something material, but the air space from the ground to the highest part of the atmosphere. Frequency bands are organized in this space, which airplanes, wi-fi, bluetooth, walkie talkies, radios, and telephones use to communicate, for example 2G, 3G, 4G phone networks all use different bands of the electromagnetic space. &lt;br /&gt;
&lt;br /&gt;
For more information about the electromagnetic space:&lt;br /&gt;
https://imagine.gsfc.nasa.gov/science/toolbox/emspectrum1.html&lt;br /&gt;
https://en.wikipedia.org/wiki/Electromagnetic_spectrum&lt;br /&gt;
&lt;br /&gt;
== What is a fake cell tower?==&lt;br /&gt;
Fake cell towers (also known as IMSI catchers) are devices designed to intercept the traffic and possibly track the movements of of a mobile phone by &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IMSI-catcher &amp;lt;/ref&amp;gt; pretending to be a &amp;quot;legitimate&amp;quot; cell tower &amp;lt;ref&amp;gt;https://www.eff.org/sls/tech/cell-site-simulators &amp;lt;/ref&amp;gt;.&lt;br /&gt;
[[File:Imsi-catcher.png|thumb|none|alt=Esquema torre falsa.| Diagram of a fake cell tower (taken from [http://cybernc.com/les-imsi-catchers/ Henri-Olivier]).]]&lt;br /&gt;
&lt;br /&gt;
IMSI catcher attacks are &amp;quot;man in the middle&amp;quot; attacks &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Man-in-the-middle_attack&amp;lt;/ref&amp;gt;. This is defined as an action that gives the attacker the ability to read, insert and modify at will, messages between two parties without either of them knowing that the link between them has been compromised. The attacker is able to observe and intercept messages between the two victims &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IntermediateAccess &amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There is evidence that such devices have been used for surveillance purposes, for example in Ukraine the mobile phones of those attending a large demonstration were tracked and then received a mass text message stating: &amp;quot;Dear subscriber, you have been registered as a participant in a mass disturbance &amp;quot;&amp;lt;ref&amp;gt;https://antivigilancia.org/es/2015/06/la-vigilancia-y-la-protesta-social/ &amp;lt;/ref&amp;gt;. In Latin America it is known that governments, such as Mexico and Colombia, have bought IMSI  Catchers.&lt;br /&gt;
&lt;br /&gt;
Unfortunately fake cell towers are becoming easier to buy and their price can be as low as 500 USD. Depending on the model there is evidence that IMSI catchers can not only intercept phone traffic, but also can also inject malware.&lt;br /&gt;
&lt;br /&gt;
==How to detect them? ==&lt;br /&gt;
&lt;br /&gt;
A first step is to have a database of &amp;quot;legitimate&amp;quot; cell towers and the list of legitimate companies that provide these services with the necessary operating permits. In some places these databases exist, such as:  http://opencellid.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Opencell.png|thumbnail|center|Towers in Latin America]]&lt;br /&gt;
&lt;br /&gt;
There is also information publicly available about the frequencies on which they should operate:&lt;br /&gt;
http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
[[File:Frecuencia.png|thumbnail|center|63/5000&lt;br /&gt;
Example of frequencies on which cellular networks can operate]]&lt;br /&gt;
&lt;br /&gt;
And you can also monitor the development of the GSM network:&lt;br /&gt;
 http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
There are also some applications that can be downloaded from F-Droid&lt;br /&gt;
(F-Droid is an alternative to Google Play Centre, where you can download free and open source Android apps independently of Google)&lt;br /&gt;
&lt;br /&gt;
To detect possible false antennas:&lt;br /&gt;
&lt;br /&gt;
[http://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/ Android IMSI Catcher Detector]&lt;br /&gt;
&lt;br /&gt;
[[File:AIMSICD-Teaser.png|400px|thumbnail|center|AIMSICD]]&lt;br /&gt;
&lt;br /&gt;
Android IMSI Catcher Detector attempts to detect IMSI-Catchers through methods such as: Check Tower Information Consistency,   Check LAC/Cell ID Consistency, check neighbouring cell info, prevent silent app installations, monitor Signal Strength, detect silent SMS and detect FemtoCells&lt;br /&gt;
&lt;br /&gt;
[https://opensource.srlabs.de/projects/snoopsnitch Snoopsnitch]&lt;br /&gt;
&lt;br /&gt;
[[File:Sc catcher hour.png|200px|thumbnail|center|Snoopsnitch]]&lt;br /&gt;
&lt;br /&gt;
SnoopSnitch is an Android app that collects and analyzes mobile radio data and can warn you about threats such as fake base stations (IMSI catchers), user tracking and over-the-air updates. With SnoopSnitch you can use the data collected in the GSM Security Map at gsmmap.org and contribute your own data to GSM Map.  This application currently only works on Android phones with a Qualcomm chipset and a stock Android ROM (or a suitable custom ROM with Qualcomm DIAG driver). It also requires root privileges to capture mobile network data.&lt;br /&gt;
&lt;br /&gt;
== How to protect yourself from fake cell towers?==&lt;br /&gt;
&lt;br /&gt;
Some phones allow you to change their configuration options so that they do not connect to all available cell towers. For example on an Android phone you can go to: Settings &amp;gt;   Wireless and networks  &amp;gt; More &amp;gt; Mobile networks and there you can change &amp;gt; Preferred network type  GSM/UTMS to using 3G or 4G. Also, if the option is available, choose &amp;lt;Network operators &amp;gt; Select  antennas manually. &lt;br /&gt;
&lt;br /&gt;
You can also isolate your mobile using a Faraday phone pouch, please this tutorial on the topic &amp;lt;ref&amp;gt;https://gendersec.tacticaltech.org/wiki/index.php/Faraday_Phone_Pouch&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
-Tela_y_proceso_de_bolsa_por_killyourphone-com.jpg|Phone Pouch&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Where can I see more information?==&lt;br /&gt;
&lt;br /&gt;
http://wiki.labomedia.org/index.php/GSM&lt;br /&gt;
https://quematumovil.pimienta.org/los_imsi-catchers.html&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Dating_platforms&amp;diff=8980</id>
		<title>Dating platforms</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Dating_platforms&amp;diff=8980"/>
				<updated>2017-03-17T10:47:49Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== What are dating platforms? ==&lt;br /&gt;
&lt;br /&gt;
Dating platforms are pages or applications oriented to facilitate meeting and encounters with other people, sometimes with the purpose of finding a partner or engage into sexual encounters. Usually these services are databases that collect information from users through a profile that can contain personal data, images, locations. There are many types of dating platforms, and all have different interfaces and features. Some are free and others offer payment options which in some cases enlarge the possibility to view more profiles.  Sometimes, the use of free platforms implies that users that no not provide a lot of personal data get restrained in their possibilities to view and access other profiles. &lt;br /&gt;
&lt;br /&gt;
Broadly speaking these platforms are divided into two types: those that work through matching and those that focus on dating.  &amp;quot;Matching&amp;quot; platforms seek to link profiles of users that are compatible, so they request a large amount of information about their preferences, customs, personal characteristics, hobbies, social status, etc.  Platforms that concentrate on dating do not request so much personal and identity information because they focus more on the physical aspects and the immediate encounter between two persons. In both cases, platform's databases can be organized through users 'preferences (who choose other users) or algorithmically, based on the users' registered criteria.&lt;br /&gt;
&lt;br /&gt;
There are platforms that work as web pages and others like mobile phone apps. Some even combine both options. The expansion of these platforms through mobile apps has been a supplement to the services previously offered through websites, and has made the interaction with those platforms (and their users) constant, emphasizing a lot in their geolocation.&lt;br /&gt;
&lt;br /&gt;
==  Privacy policies of dating websites and apps ==&lt;br /&gt;
&lt;br /&gt;
Privacy policies change and evolve over time! That is to say that when accepting the terms of use and privacy policies of a platform does not ensure that those remain always the same. It will be necessary to review these periodically as many platforms do not inform their users about changes in their policies.&lt;br /&gt;
Unfortunately it is difficult to generalize with respect to the privacy policies of these platforms. Many platforms handle the users' personal information without encrypting it, so it can be easily retrieved by third parties. But even, in general, it is the same privacy policies that state that the information entered in the databases can be accessed by third parties.&lt;br /&gt;
&lt;br /&gt;
Most of these platforms become proprietary of the images that are shared or upload, as well as the personal information that has been configured in the profile. This applies even once the account has been closed, so you have to be very sure about the data you want to share in these spaces since there seems to be no turning back. Finally, to be able to know each of the platforms in terms of its privacy policy, it would be important to run a textual cleaning exercise as the analysis of different social networks that has been achieved by [http://Https://myshadow.org/lost-in-small-print the project lost in Small Print from My Shadow] for the following platforms: Google, Facebook, Twitter,  Linkedin, Instagram and Whasapp.&lt;br /&gt;
&lt;br /&gt;
== Information requested by the platforms ==&lt;br /&gt;
&lt;br /&gt;
=== Gender, sexual orientation and practices ===&lt;br /&gt;
&lt;br /&gt;
Many of these platforms require to provide a gender option, genres that are often mutually exclusive (you can only be male or female). If it is oriented towards gays or lesbians, a gender identity is always requested, almost always offering only binary options.&lt;br /&gt;
Many of these platforms are used for exchanges and contacts between LGTBI people, and since in many cases these practices are illegal, prohibited or would harm the user in case of becoming public information,  data shared in these platforms is very sensitive. In general, gender and sexual choices are felt as sensitive information.&lt;br /&gt;
&lt;br /&gt;
=== Images and avatars ===&lt;br /&gt;
&lt;br /&gt;
Several dating platforms request photos (sometimes through profiles of other social networks, such as Facebook) as a participation requirement. Without sharing these images it will not be possible to access other profiles or to access the databases of contact.&lt;br /&gt;
This also happens because many platforms use credentials such as Facebook to open a profile. In that sense, it is not clear how much information from the social network profile the meeting platforms can manage. Several of the apps incorporate much more information from Facebook than the user may have been informed when logging in the dating platform, information such as videos shared in other commercial platforms (such as Youtube or Vimeo), or pages that have been marked with likes. &lt;br /&gt;
You can read more on the [https://arxiv.org/pdf/1505.02906v1.pdf privacy risks on the mobile dating apps].&lt;br /&gt;
&lt;br /&gt;
=== Geolocation ===&lt;br /&gt;
&lt;br /&gt;
Many platforms, especially if they are applications for the mobile phone, ask about your location to allow the encounter with other people. This has its logic, as one of the objectives is to facilitate casual and immediate encounters, it is necessary to know who is near in real time and who can be around at the exact moment in which the app is consulted. Therefore, for severeal of these applications, users in some way depend on the distance being shown in relation to other profiles, but this is also what makes them potentially exposed to the risk of being located by someone with whom they had not planned a meeting.&lt;br /&gt;
Despite of these risks, most users of these platforms based on casual and instant encounters share their real-time location on a daily basis with these apps. This could even allow to determine the user's physical address, track their movements and routine and enable to harass them during the day. Localization information along with other information commonly shared on these platforms such as height, weight, age, habits and customs may serve to locate potential victims. &lt;br /&gt;
&lt;br /&gt;
All these data can be used both by &amp;quot;legal&amp;quot; surveillance (governments, police forces, judiciary among others), or for illegal and malicious purposes (crime, robbery, sexual assault among others). All the information obtained through these platforms could also be used for the purpose of extorting the user. You can read more information on these risks in the [https://arxiv.org/pdf/1505.02906v1.pdf following article  “Privacy Risks in Mobile Dating Apps”].&lt;br /&gt;
&lt;br /&gt;
From the above we understand that the vulnerability of users when sharing their personal information in these platforms can easily expand to the physical terrain. Many apps allow you to detect the exact location from the triangulation of a profile (sometimes even when the exact geolocation option is turned off), making it easy to found and attack the person behind a specific profile.&lt;br /&gt;
&lt;br /&gt;
[https://arxiv.org/pdf/1604.08235v1.pdf You can read a comparative study of three mobile dating apps here.]&lt;br /&gt;
&lt;br /&gt;
=== Other data that can be extracted === &lt;br /&gt;
&lt;br /&gt;
Until now, we have referred to potential vulnerabilities driven by authorities or criminals,, however, most of the information of the users that circulates through these platforms can also be acceded by third parties for advertising purposes.&lt;br /&gt;
&lt;br /&gt;
Because,  the data is not encrypted in practically all of these platforms , third parties are able to access and collect information regarding user's device, its operating system, the applications is using, its location, its internet provider, and even sometimes its credit card details among others.&lt;br /&gt;
&lt;br /&gt;
Besides that, because many dating platforms are linked to other applications and social networks causes third parties to cross databases in order to increase their knowledge about you air order to better know &amp;quot;what you need.&amp;quot; An example could be the possible relationship between fertility and menstrual applications and dating applications. Through knowing your hormonal cycles, third parties could send you advertising information or &amp;quot;right&amp;quot; contacts for the time of the cycle in which you are.&lt;br /&gt;
&lt;br /&gt;
On the other hand, it is possible that your information will be used to extort you. Platforms sometimes can not control what they make available. One example is when Tinder was sharing [https://www.theguardian.com/technology/2014/feb/20/tinder-app-dating-data-location-sharing more information than they  should, you an read about it here]. &lt;br /&gt;
There is also the Ashley Madison case where users got extorted in order to not publish their personal information and more specifically not publishing how they use that extra-matrimonial dating platform, [http://money.cnn.com/2015/08/24/technology/ashley-madison-hack-in-2-minutes you can read more here].&lt;br /&gt;
&lt;br /&gt;
== Erasing your profile ==&lt;br /&gt;
&lt;br /&gt;
Although many dating services offer the possibility of deleting your profile, they do not ensure the removal of the information immediately and many will keep that data forever. In general, platforms displace the responsibility for privacy on the users themselves, as they are not generally very clear about the limitations of their own privacy policies.&lt;br /&gt;
&lt;br /&gt;
In the current state of privacy policies (which could change at any time), developers should consider the different types of sensitive data being collected and stored on mobile devices that could be subject to unauthorized access (whether physical Or remotely), and evaluate how this data could be more protected.&lt;br /&gt;
For example, by encrypting sensitive information stored on a mobile phone. Although it will probably not solve the problem of unauthorized access, it will at least provide an extra layer of difficulty in front of a physical attack. Providers could also implement technical procedures to detect incorrect storage of sensitive data on mobile devices during the app's initial validation process. But as underlined before, the ultimate responsibility lies in the users, who must protect themselves from apps that store their sensitive information without taking the appropriate security and privacy measures. Users should be cautious when selecting apps, particularly those they use to store and transmit personal information.&lt;br /&gt;
&lt;br /&gt;
== Recomendations ==&lt;br /&gt;
&lt;br /&gt;
=== When you create a profile on a dating platform, try to protect your identity and personal information as much as possible===&lt;br /&gt;
&lt;br /&gt;
- Choose a username that does not let anyone know who you are. Do not include your last name or information such as your place of work, address of your house, etc.&lt;br /&gt;
&lt;br /&gt;
- If you can do not include your personal e-mail or your phone number in your profile.&lt;br /&gt;
&lt;br /&gt;
- Regarding images, try to share the ones you do not care that anyone in the world can see.&lt;br /&gt;
&lt;br /&gt;
Regarding passwords and your security when using these platforms:&lt;br /&gt;
&lt;br /&gt;
- Be careful when you access the platforms from a shared device, and also be careful if you do it from a public wi-fi since third parties could intercept your data.&lt;br /&gt;
&lt;br /&gt;
- Do not open attachments that have been sent to you by unknown people (or that you have recently known through the platform)&lt;br /&gt;
&lt;br /&gt;
=== Regarding how to communicate with new contacts ===&lt;br /&gt;
&lt;br /&gt;
- After contacting someone you can try to use another type of platform to communicate with that person. Look for an encrypted communication medium, for example [https://en.wikipedia.org/wiki/Signal_(software) Signal]&lt;br /&gt;
&lt;br /&gt;
Once you are using other means, outside the dating platforms, you can follow some recommendations of the collective Coding Rights&lt;br /&gt;
&lt;br /&gt;
- Use secure channels: You need an app based in free software that offers encryption at all levels, which allows you to block screenshots, send images that self-destruct on both the device from which they were sent and on the server, do not ask for a related phone number, a real name or an email. Unfortunately the app that does all the above does not exist yet. Keep that in mind.&lt;br /&gt;
&lt;br /&gt;
- Use your head: Do not do sexting via SMS, Whatsapp, Telegram, Facebook or Tinder as those platforms enable to identify ou and download your pictures. [https://en.wikipedia.org/wiki/Wickr Wickr], for example, encrypts end-to-end and causes the photos to be erased after being viewed. However Wickr is not open source so its code can not be audited and reviewed. Last not least, do not synchronize your dating apps with any social network.&lt;br /&gt;
&lt;br /&gt;
- And Telegram?: Although it is safer than other apps, it saves your photos during 24 hours on the server and ask you to register.&lt;br /&gt;
&lt;br /&gt;
- Who can see me naked ?: Basically governments and private companies (especially if they have servers) can do it. And, in addition, if you use a public wi-fi, anyone who knows how to intercept the traffic.&lt;br /&gt;
&lt;br /&gt;
- Erase or hide well: Saving encrypted photos is a good security measure, but erasing those is another alternative. Remember that your mobile stores photos in different folders so use programs like CC Cleaner to erase pictures. Think that your mobile can be lost and fall into bad hands, so doing a general erasure/cleaning from time to time is a good idea. If you decide to save them, remember that the PGP suite allows you to encrypt very well those contents. &lt;br /&gt;
&lt;br /&gt;
- Ask for help: If your photos become public it is not a problem meanwhile it is your decision, but if it is not, then you will need to take action. Sometimes it is enough to send an email to the server that hosts the page, others you will need to look for a lawyer. But above all, seek help of trusted friends. Check the following websites for further information about what to do [http://www.withoutmyconsent.org/ withoutmyconsent.org] and [https://www.takebackthetech.net/know-more takebackthetech.net/know-more].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Interesting readings==&lt;br /&gt;
&lt;br /&gt;
Security comparison from Electronic Frontier Foundation: &lt;br /&gt;
https://www.eff.org/es/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites&lt;br /&gt;
&lt;br /&gt;
Nguyen Phong HOANG, Yasuhito ASANO, Masatoshi YOSHIKAWA, &amp;quot;Your Neighbors Are My Spies: Location and other Privacy Concerns in GLBT-focused Location-based Dating Applications&amp;quot; &lt;br /&gt;
https://arxiv.org/pdf/1604.08235v1.pdf&lt;br /&gt;
  &lt;br /&gt;
Security comparison for dating platforms in USA between 2005 and 2013: http://www.secretintelligenceservice.org/wp-content/uploads/2016/02/PIP_Online-Dating-2013.pdf &lt;br /&gt;
&lt;br /&gt;
Margaret Feltz &amp;quot;The Security of Tinder. A Mobile App That May Be More Intimate Than We Thought&amp;quot;:&lt;br /&gt;
http://www.cs.tufts.edu/comp/116/archive/fall2015/mfeltz.pdf&lt;br /&gt;
&lt;br /&gt;
Other Statistics: &lt;br /&gt;
http://www.datingsitesreviews.com/staticpages/index.php?page=Online-Dating-Industry-Facts-Statistics&lt;br /&gt;
&lt;br /&gt;
=== Platforms ===&lt;br /&gt;
&lt;br /&gt;
1.- Tinder&lt;br /&gt;
http://www.forbes.com/sites/anthonykosner/2014/02/18/tinder-dating-app-users-are-playing-with-privacy-fire/#1388ac786758&lt;br /&gt;
&lt;br /&gt;
Privacy Policy https://www.gotinder.com/privacy&lt;br /&gt;
&lt;br /&gt;
2.- Bumble, feminist alternative?&lt;br /&gt;
http://www.semana.com/gente/articulo/tinder-su-competencia-feminista/439477-3&lt;br /&gt;
&lt;br /&gt;
3.- Grindr &lt;br /&gt;
https://nakedsecurity.sophos.com/2014/09/01/grindr-app-has-privacy-issues-whos-surprised/&lt;br /&gt;
&lt;br /&gt;
4.- KickOff&lt;br /&gt;
http://www.fmbox.cl/2016/05/25/kickoff-la-nueva-app-de-citas-que-la-esta-rompiendo-en-latinoamerica/&lt;br /&gt;
&lt;br /&gt;
5.- WooPlus&lt;br /&gt;
http://latam.askmen.com/noticias-dating/2027/article/wooplus-la-app-de-citas-para-quienes-gustan-de-las-chicas-co&lt;br /&gt;
&lt;br /&gt;
6.- Wapa (before called Brenda)&lt;br /&gt;
https://play.google.com/store/apps/details?id=com.wapoapp.wapa&amp;amp;hl=es_419&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
== What are dating platforms? ==&lt;br /&gt;
&lt;br /&gt;
Dating websites and apps are widely used, but can often put their users at risk. Dating websites and apps collect large amounts of highly sensitive information from their users - consciously in some cases, for example age, physical characteristics and photos, and in some cases unknowingly, for example geo-location to show people nearby. This guide covers the basic issues you should be aware of when you use a dating website or app.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==  Privacy policies of dating websites and apps ==&lt;br /&gt;
&lt;br /&gt;
Dating website and apps frequently change their privacy policies and often without informing their users. If you've joined one or more dating websites or apps check the privacy policies regularly.&lt;br /&gt;
&lt;br /&gt;
When you check the privacy policy of a dating webisite or app you should check for these issues in particular:&lt;br /&gt;
&lt;br /&gt;
Data Storage - many websites store sensitive data unencrypted so third parties can easily access it. Many dating services will also state that the data will be shared with third parties&lt;br /&gt;
&lt;br /&gt;
Intellectual property: Many dating services will claim ownership on any images uploaded and often the data entered when configured to their system.&lt;br /&gt;
&lt;br /&gt;
Account deletion: Many dating services will not commit to removing all your data when you close or delete your account.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Information requested by the platforms ==&lt;br /&gt;
&lt;br /&gt;
=== Gender, sexual orientation and practices ===&lt;br /&gt;
&lt;br /&gt;
Many of these platforms require you to enter a binary gender (you can only be male or female). If they are oriented towards gay men and/or lesbians, a gender identity is always requested, almost always offering only binary options.&lt;br /&gt;
&lt;br /&gt;
Any information on gender and sexual choices is of course highly sensitive, particularly in contexts where LGBTQI prcactices are illegal or would harm the user if publicly known.&lt;br /&gt;
&lt;br /&gt;
=== Images and avatars ===&lt;br /&gt;
&lt;br /&gt;
Several dating platforms require photos (sometimes through profiles of other social networks, such as Facebook) to join or to access other profiles. &lt;br /&gt;
&lt;br /&gt;
Many platforms also use accounts from other services, such as Facebook, to create a profile. For these services, it is often not clear how much profile information is accessed from other services. Some apps incorporate much more information from say Facebook than the user may have been informed about when signing up, for example videos shared in other commercial platforms (such as Youtube or Vimeo), or pages that have been marked with likes. &lt;br /&gt;
You can read more on the [https://arxiv.org/pdf/1505.02906v1.pdf privacy risks on the mobile dating apps].&lt;br /&gt;
&lt;br /&gt;
=== Geolocation ==&lt;br /&gt;
&lt;br /&gt;
Many dating websites, and especially dating phone apps, access your location so you can meet other people nearby in real time. This may be the desired outcome, but sharing detailed and current location data could put people at risk of being located by anyone. This information could potentially reveal a person's physical address, their movements and routine. Many apps allow you to detect the exact location from the triangulation of a profile (sometimes even when the exact geolocation option is turned off), making it easy to find a person behind a specific profile.&lt;br /&gt;
&lt;br /&gt;
The data from online dating services can be used both for &amp;quot;legal&amp;quot; surveillance (governments, police forces, judiciary among others), or for illegal and malicious purposes (harassment, crime, robbery, sexual assault among others). All the information obtained through these platforms could also be used for the purpose of extorting the user. You can read more information on these risks in the [https://arxiv.org/pdf/1505.02906v1.pdf following article  “Privacy Risks in Mobile Dating Apps”].&lt;br /&gt;
&lt;br /&gt;
[https://arxiv.org/pdf/1604.08235v1.pdf You can read a comparative study of three mobile dating apps here.]&lt;br /&gt;
&lt;br /&gt;
=== Other data that can be extracted === &lt;br /&gt;
&lt;br /&gt;
Sensitive personal data in dating websites and apps is not just of interest to legal authorities and criminals, however, it can also be accessed by advertisers and data brokers.&lt;br /&gt;
&lt;br /&gt;
Because virtually all dating services do not encrypt their data , third parties are able to access and collect information such as a user's device information, its operating system, the installed applications, its location, its internet provider, even sometimes the user's credit card details and potentially much more.&lt;br /&gt;
&lt;br /&gt;
By linking with other services, dating websites and apps can enable other companies to cross reference your personal data  with other services to build a more detailed social profile of you to understand &amp;quot;what you need&amp;quot;.   An example could be the possible relationship between fertility and menstrual applications and dating applications; through knowing your hormonal cycles, third parties could send you advertising information for a specific point  in your menstrual cycle.&lt;br /&gt;
&lt;br /&gt;
Furthermore, it is possible that your information could be used to blackmail you. Platforms sometimes can not control what they make available. One example of this was Tinder [https://www.theguardian.com/technology/2014/feb/20/tinder-app-dating-data-location-sharing more information than they  should, you an read about it here]. &lt;br /&gt;
There was also the hack of the Ashley Madison extra-martial dating website. Users were blackmailed to prevent their personal data and activities on the website being published, [http://money.cnn.com/2015/08/24/technology/ashley-madison-hack-in-2-minutes you can read more here].&lt;br /&gt;
&lt;br /&gt;
== Erasing your profile ==&lt;br /&gt;
&lt;br /&gt;
Although many dating services offer the possibility of deleting your profile, they often do not ensure the removal of the information immediately and many will keep that data indefinitely. In general, platforms place the responsibility for privacy onto the users themselves as they are generally very unclear about the limitations of their own privacy policies.&lt;br /&gt;
&lt;br /&gt;
In the current state of privacy policies (which could change at any time), developers should consider the different types of sensitive data being collected and stored on mobile devices that could be subject to unauthorized access (whether physical or remotely), and evaluate how this data could be more protected.&lt;br /&gt;
&lt;br /&gt;
For example, encrypting sensitive information stored on a mobile phone, although not offering complete protection, will at least provide an extra layer of security against physical attack. Providers could also implement technical procedures to detect incorrect storage of sensitive data on mobile devices during the app's initial validation process. But as underlined before, the ultimate responsibility currently lies with the users, who must protect themselves from apps that store their sensitive information without appropriate security and privacy measures. Users should be cautious when selecting apps, particularly those they use to store and transmit personal information.&lt;br /&gt;
&lt;br /&gt;
== Recomendations ==&lt;br /&gt;
&lt;br /&gt;
=== When you create a profile on a dating platform, try to protect your identity and personal information as much as possible===&lt;br /&gt;
&lt;br /&gt;
- Choose a username that does not let anyone know who you are. Do not include your last name or information such as your place of work, address of your house, etc.&lt;br /&gt;
&lt;br /&gt;
- If possible do not include your personal e-mail or your phone number in your profile.&lt;br /&gt;
&lt;br /&gt;
- Only upload photos you are comfortable sharing with anyone, anywhere.&lt;br /&gt;
&lt;br /&gt;
Regarding passwords and your security when using these platforms:&lt;br /&gt;
&lt;br /&gt;
- Be careful when you access the platforms from a shared device, and also be careful if you log in using public wi-fi since third parties could intercept your data.&lt;br /&gt;
&lt;br /&gt;
- Do not open attachments that have been sent to you by unknown people (or that you have recently met through the platform)&lt;br /&gt;
&lt;br /&gt;
=== Regarding how to communicate with new contacts ===&lt;br /&gt;
&lt;br /&gt;
- After contacting someone suggest using another chat app with that person as soon as possible. Look for an encrypted tool, for example [https://en.wikipedia.org/wiki/Signal_(software) Signal]&lt;br /&gt;
&lt;br /&gt;
Once you are using a secure chat app, you can follow some recommendations of the collective Coding Rights&lt;br /&gt;
&lt;br /&gt;
- Use secure channels: You need an app based on free software that offers encryption at all levels, which allows you to block screenshots, send images that self-destruct on both the device from which they were sent and on the server, do not ask for a related phone number, a real name or an email. Unfortunately the app that does all the above does not exist yet. Keep that in mind.&lt;br /&gt;
&lt;br /&gt;
- Use your head: Do not sext via SMS, Whatsapp, Telegram, Facebook or Tinder, as those platforms enable you to be identified and your pictures to be downloaded. [https://en.wikipedia.org/wiki/Wickr Wickr], for example, encrypts end-to-end and causes the photos to be erased after being viewed. However Wickr is not open source so its code can not be audited and reviewed. Last but not least, do not synchronize your dating apps with any social network.&lt;br /&gt;
&lt;br /&gt;
- And Telegram?: Although it is safer than other apps, it saves your photos for 24 hours on the server and also requires you to register.&lt;br /&gt;
&lt;br /&gt;
- Who can see me naked ?: Basically governments and private companies (especially if they have servers) can. And, in addition, if you use a public WiFi, anyone who knows how to intercept WiFi traffic.&lt;br /&gt;
&lt;br /&gt;
- Erase or hide well: Saving encrypted photos is a good security measure, but deleting photos is a better option. Remember that your mobile stores photos in different folders, so use programs like CC Cleaner to erase pictures. Remember that your mobile can be lost and can fall into the wrong hands, so doing a general erasure/cleaning from time to time is a good idea. If you decide to save your photos, remember that PGP suite allows you to encrypt them securely. &lt;br /&gt;
&lt;br /&gt;
- Ask for help: If your photos become public without your consent, you will need to take action. Sometimes it is enough to send an email to the server that hosts the page, in other situations you may need to look for a lawyer. But above all, seek help of trusted friends. Check the following websites for further information about what to do [http://www.withoutmyconsent.org/ withoutmyconsent.org] and [https://www.takebackthetech.net/know-more takebackthetech.net/know-more].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Useful reading==&lt;br /&gt;
&lt;br /&gt;
Security comparison from Electronic Frontier Foundation: &lt;br /&gt;
https://www.eff.org/es/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites&lt;br /&gt;
&lt;br /&gt;
Nguyen Phong HOANG, Yasuhito ASANO, Masatoshi YOSHIKAWA, &amp;quot;Your Neighbors Are My Spies: Location and other Privacy Concerns in LBGT-focused Location-based Dating Applications&amp;quot; &lt;br /&gt;
https://arxiv.org/pdf/1604.08235v1.pdf&lt;br /&gt;
  &lt;br /&gt;
Security comparison for dating platforms in USA between 2005 and 2013: http://www.secretintelligenceservice.org/wp-content/uploads/2016/02/PIP_Online-Dating-2013.pdf &lt;br /&gt;
&lt;br /&gt;
Margaret Feltz &amp;quot;The Security of Tinder. A Mobile App That May Be More Intimate Than We Thought&amp;quot;:&lt;br /&gt;
http://www.cs.tufts.edu/comp/116/archive/fall2015/mfeltz.pdf&lt;br /&gt;
&lt;br /&gt;
Other Statistics: &lt;br /&gt;
http://www.datingsitesreviews.com/staticpages/index.php?page=Online-Dating-Industry-Facts-Statistics&lt;br /&gt;
&lt;br /&gt;
=== Platforms ===&lt;br /&gt;
&lt;br /&gt;
1.- Tinder&lt;br /&gt;
http://www.forbes.com/sites/anthonykosner/2014/02/18/tinder-dating-app-users-are-playing-with-privacy-fire/#1388ac786758&lt;br /&gt;
&lt;br /&gt;
Privacy Policy https://www.gotinder.com/privacy&lt;br /&gt;
&lt;br /&gt;
2.- Bumble, feminist alternative?&lt;br /&gt;
http://www.semana.com/gente/articulo/tinder-su-competencia-feminista/439477-3&lt;br /&gt;
&lt;br /&gt;
3.- Grindr &lt;br /&gt;
https://nakedsecurity.sophos.com/2014/09/01/grindr-app-has-privacy-issues-whos-surprised/&lt;br /&gt;
&lt;br /&gt;
4.- KickOff&lt;br /&gt;
http://www.fmbox.cl/2016/05/25/kickoff-la-nueva-app-de-citas-que-la-esta-rompiendo-en-latinoamerica/&lt;br /&gt;
&lt;br /&gt;
5.- WooPlus&lt;br /&gt;
http://latam.askmen.com/noticias-dating/2027/article/wooplus-la-app-de-citas-para-quienes-gustan-de-las-chicas-co&lt;br /&gt;
&lt;br /&gt;
6.- Wapa (before called Brenda)&lt;br /&gt;
https://play.google.com/store/apps/details?id=com.wapoapp.wapa&amp;amp;hl=es_419&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Mobiles:_Alternatives&amp;diff=8979</id>
		<title>Mobiles: Alternatives</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Mobiles:_Alternatives&amp;diff=8979"/>
				<updated>2017-03-17T10:02:53Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:dany guzman.jpg|400px]]&lt;br /&gt;
&amp;lt;ref&amp;gt;Fotográfo: Daniel Guzman. Isla Negra, Chile. &amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Autonomous and Community Mobile Telephony ==&lt;br /&gt;
According to the International Telecommunication Union&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/International_Telecommunication_Union&amp;lt;/ref&amp;gt;  in the world there are between 2 to 3 billion people who lack mobile telephony services, this is due mainly because telecommunications regulatory bodies grant concessions to access the mobile radio spectrum only to large companies, restricting access to micro enterprises that wish to provide this service to rural areas for instance.&lt;br /&gt;
&lt;br /&gt;
It is common to think that the only way to communicate through mobile phones is to use the services of large transnational mobile phone companies and that profit is the only economic model for the creation and sustainability of these services. However, there are communities and villages that are located in geographically remote territories, with a low population density and / or where the economy is based on self-subsistence economies, and which remain unappealing for large companies which are in general not interested in providing services (considering for example that the initial investment Is too high). Sometimes, these communities do not want telephony services based on an unscrupulous profit model neither.&lt;br /&gt;
&lt;br /&gt;
It is within these communities that the hope is born for new creative and collaborative ways of providing telephony services. We present below some of these alternative mobile phone projects whose models are based on the exercise of the right of peoples' to communication.&lt;br /&gt;
&lt;br /&gt;
=== Rhizomatica ===&lt;br /&gt;
[[File:Untitled-2.jpg|400px]]&lt;br /&gt;
&lt;br /&gt;
The Rhizomatica organization is located in Oaxaca&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Oaxaca&amp;lt;/ref&amp;gt;, in the south-east of Mexico.&lt;br /&gt;
It works by creating bridges between communities of indigenous peoples of Mexico and people engaged in telecommunications engineering with open systems, with the objective of creating mobile telephony infrastructure to strengthen the autonomy of indigenous peoples. In order to understand the origin and success of the autonomous mobile telephony project, it is important to understand its context.&lt;br /&gt;
&lt;br /&gt;
==== Context and history ====&lt;br /&gt;
Oaxaca is a complex territory, with a great cultural diversity (17 indigenous peoples co-inhabit the territory), with a rugged geography, where the territory is communal, there are strong structures of local government recognized by the Mexican constitution and international treaties, Economy is basically based on self-subsistence.&lt;br /&gt;
&lt;br /&gt;
In the 1970s and 1980s, these peoples began their first communal enterprises for the management of common goods * forestry and aquifers that are the precedent for the current communal telecommunication enterprises described here. This complex context is the fertile ground for infrastructure projects in telecommunications that strengthen the autonomy of indigenous peoples.&lt;br /&gt;
&lt;br /&gt;
From the 2006 social movement&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Asamblea_Popular_de_los_Pueblos_de_Oaxaca&amp;lt;/ref&amp;gt; the native peoples of Oaxaca engaged in the task of creating their own means of communication, with special emphasis on the Community radios. At the moment, Oaxaca is the state with the greater concentration of these radios in all the country. Although there is no official census, social organizations estimate that there are between 60 and 100 community radios currently operating in the state of Oaxaca.&lt;br /&gt;
&lt;br /&gt;
Driven by the need for communication, the communal authorities of these towns approached innumerable times big companies to request services of mobile telephony  but the result was a refusal because they are small towns, located in remote areas and with few resources. Because of this, communal villages began a dialogue with the team of Rhizomatica to look for the ways to construct infrastructure of mobile telephony that would strengthen the autonomy of their towns. This was how the Autonomous and Community Cellular Telephone project emerged.&lt;br /&gt;
&lt;br /&gt;
==== Infrastructure ====&lt;br /&gt;
In technical terms, the autonomous mobile telephony infrastructure consists of a&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Transceiver&amp;lt;/ref&amp;gt; transceiver that emits and receives radio waves at the frequency of 850 MHz with 5 Watts of Power and an antenna located in the high part of the territory which allows to cover up to 15 km around. These are radio waves that require line of sight, meaning that mountainous geography should be considered so that the signal reaches far. Any type of phone can access these networks, a specific SIM card is not required. In the case of Oaxaca, the numbering system is constructed according to the postal code assigned to that territory. The system of administration and billing is made to be adapted to the original languages that are spoken in the locality.&lt;br /&gt;
&lt;br /&gt;
For more details about the architecture system, the hardware and software used, we recommend you to view the Rhizomatica wiki&lt;br /&gt;
http://wiki.rhizomatica.org/index.php/System_Architecture/es&lt;br /&gt;
[[File:Screenshot4.png|400px]]&lt;br /&gt;
[[File:Screenshot2.png|400px]]&lt;br /&gt;
&lt;br /&gt;
Currently (July 2016) the project encompasses 17 communities&amp;lt;ref&amp;gt;http://wiki.rhizomatica.org/index.php/Map_with_current_sites&amp;lt;/ref&amp;gt;, and some of them are interconnected. Each transceiver is owned by the communal governing body of each village. The cost per telephone registered in the network is 40 Mexican pesos per month equivalent to $ 2 USD for unlimited calls and text messages within the interconnected community or region. For out-of-town calls such as the city of Oaxaca or a city in the United States, calls come through the voice over IP (VoIP) system&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Voz_sobre_protocolo_de_internet&amp;lt;/ref&amp;gt; offering network users the lowest rates in the market. To achieve this it is important that the community that wants to have an autonomous mobile telephone system, first resolve the issue of their Internet connection. Usually this is done through local micro-enterprises that are creating networks through WiFi links to take the Internet to those places.&lt;br /&gt;
The cost of a computer, the importation of the equipment, the installation and training for its administration is approximately $ 7,000 USD. Currently Rhizomatica uses NuRAN Wireless &amp;lt;ref&amp;gt;http://nuranwireless.com/&amp;lt;/ref&amp;gt;equipment among other providers. This cost is expected to decline in the coming years with the development of new open source hardware devices.&lt;br /&gt;
&lt;br /&gt;
Among the main requirements for the installation of an autonomous mobile telephone networks we find:&lt;br /&gt;
- Count with the approval of the community assembly&lt;br /&gt;
- No signal from another mobile phone company&lt;br /&gt;
- Have an Internet connection&lt;br /&gt;
&lt;br /&gt;
Rhizomatica currently has around 3,000 users of autonomous mobile telephony services in Oaxaca. From this experience, a group of young computer students developed has replicated a similar project on the Nicaraguan Atlantic coast called SayCel&amp;lt;ref&amp;gt;http://itp.junglebrains.com/saycel-community-cellular-networks/&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==== Political achievements ====&lt;br /&gt;
The achievement of Rhizomatica and the native peoples of Oaxaca is not only technical but also political.  Last June, 2016, the civil association Telecomunicaciones Indígenas Comunitarias (TIC AC), made up of the 17 communities that have autonomous mobile telephone networks won a 15-year concession to operate telecommunications networks in 5 states of the Mexican republic: Veracruz, Guerrero, Oaxaca, Puebla and Chiapas. This achievement sets a historic precedent in telecommunications in Mexico and in the world, with which the International Telecommunication Union shows it as an example to be followed by other governments in the region.&lt;br /&gt;
&lt;br /&gt;
==== Challenges ====&lt;br /&gt;
Among the main challenges that Rhizomatica faces we find the access to data for Internet browsing and the transformation of the customer-company relationship as people are accustomed to the fact that mobile phone services are in the hands of transnational companies and not in their own hands .&lt;br /&gt;
&lt;br /&gt;
==== Videos ====&lt;br /&gt;
To know more about the project, we invite you to watch the following videos&lt;br /&gt;
Network of Santa María Yaviche: &lt;br /&gt;
{{#ev:vimeo|https://vimeo.com/97613709}}&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|https://www.youtube.com/watch?v=4cVnkOvUZtw}}&lt;br /&gt;
&lt;br /&gt;
Desinformemonos Video&lt;br /&gt;
{{#ev:youtube|https://www.youtube.com/watch?v=qQfwQ7sGvgM}}&lt;br /&gt;
&lt;br /&gt;
==== Press ====&lt;br /&gt;
WIRED article&lt;br /&gt;
English Version:&lt;br /&gt;
http://www.wired.com/2015/01/diy-cellular-phone-networks-mexico/&lt;br /&gt;
&lt;br /&gt;
Desinformemonos&lt;br /&gt;
http://desinformemonos.org.mx/la-telefonia-comunitaria-el-desafio-que-crece/&lt;br /&gt;
&lt;br /&gt;
About the 15 years concession&lt;br /&gt;
http://www.sinembargo.mx/23-07-2016/3071050&lt;br /&gt;
http://eleconomista.com.mx/industrias/2016/07/07/indigenas-oaxaca-seran-operadores-como-att-telcel-movistar&lt;br /&gt;
&lt;br /&gt;
==== Contact ====&lt;br /&gt;
[http://www.rhizomatica.org www.rhizomatica.org]&lt;br /&gt;
&lt;br /&gt;
rhizomaticomms[@]gmail.com&lt;br /&gt;
&lt;br /&gt;
[http://@rhizomatica https://twitter.com/rhizomatica]&lt;br /&gt;
&lt;br /&gt;
== Free and communitarian WIFI networks==&lt;br /&gt;
&lt;br /&gt;
=== Altermundi ===&lt;br /&gt;
[[File:altermundi.png|400px]]&lt;br /&gt;
&lt;br /&gt;
'''Altermundi “la pata tecnológica de ese otro mundo posible”'''&lt;br /&gt;
https://www.altermundi.net/&lt;br /&gt;
&lt;br /&gt;
==== History ====&lt;br /&gt;
It is a civil association that was born in the province of Córdoba&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Provincia_de_C%C3%B3rdoba_%28Argentina%29&amp;lt;/ref&amp;gt; in Argentina&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Argentina&amp;lt;/ref&amp;gt;, its mission is to create Internet infrastructure through the use of Free Software and very low cost hardware. Altermundi creates decentralized wireless networks, using WiFi routers and a&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Firmware&amp;lt;/ref&amp;gt;firmware to modify the router's operation.&lt;br /&gt;
&lt;br /&gt;
&amp;quot;A community network is a network built, managed, administrated, by the people who are going to use it. It prioritizes local traffic, maintains peering agreements&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Peering&amp;lt;/ref&amp;gt; (Internet free transit) with any network that offers reciprocity. This was the Internet when it started, that was the original spirit, which has been lost. Internet has been closed and the big networks do not give peering to the people, they broke the model of peer to pee&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Peer-to-peer&amp;lt;/ref&amp;gt;. For us, community networks have two axes: giving concrete solutions to people of flesh and blood , and at the same time &amp;quot;contaminate&amp;quot; the current the Internet with the old spirit of the Internet &amp;quot;Nicolás Echániz&amp;lt;ref&amp;gt;https://twitter.com/nicoechaniz&amp;lt;/ref&amp;gt; founding member of Altermundi.&lt;br /&gt;
&lt;br /&gt;
The main advantage of these networks is that they allow access to the Internet in villages where there is no access to the services of commercial companies but above all they are very simple to manage and administer by people in the community itself, without the need for specialized knowledge in electronics or computing and at an affordable price. In addition anyone can extend the network, respecting its design and its principles because its growth is not based in a business model.&lt;br /&gt;
&lt;br /&gt;
Through this free Internet network people have access to a local chat service, to online transmission of local community radio, to VoIP calls, to share files between peers and to games. In Argentina, these networks are located in Delta de Tigre in Buenos Aires and the Valley of Paravachasca in Cordoba.&lt;br /&gt;
&lt;br /&gt;
==== Infrastructure ====&lt;br /&gt;
The hardware&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Hardware&amp;lt;/ref&amp;gt; consists of a router and an antenna, as well as other materials to adapt the router and the cable that connects to the antenna in the open. In the router if you install a firmware (operating system) that allows autoconfiguration and other programs for personalization and monitoring of the network.&lt;br /&gt;
&lt;br /&gt;
Altermundi modifies the routers so that when connecting with a directional antenna the signal of WiFi can cover a few kilometers, in this way a network of devices with WiFi signal is built by which they can interchange data between people within a town or region and also can connect the network to what we know today by Internet, allowing to share it in the network.&lt;br /&gt;
&lt;br /&gt;
''''''What is the difference between a Free Network and a Community Network?''''''&lt;br /&gt;
Characteristics of a Free Network:&lt;br /&gt;
&lt;br /&gt;
* Free use: it can be used by its participants to offer and receive any type of service that does not affect its good functioning;&lt;br /&gt;
* Neutrality: does not inspect or modify data flows within the network beyond what is necessary for its operation;&lt;br /&gt;
* Free interconnection: allows, freedom and free services, the flow of data with other networks that respect the same conditions;&lt;br /&gt;
* Free transit: it provides other free networks access to the networks with which it maintains voluntary agreements of free interconnection.&lt;br /&gt;
&lt;br /&gt;
The goal of free networks is to return common sense to the Internet structure, allowing the free flow of information, making the most of infrastructure and lowering costs so that small businesses can be deployed easily in areas where Internet access is unfeasible. In this sense Community Networks are an expression of Free Networks because they play a fundamental role for the community through the following characteristics:&lt;br /&gt;
&lt;br /&gt;
* Collective ownership: its infrastructure is owned by the community that deploys it;&lt;br /&gt;
* Social management: the network is managed by the same community;&lt;br /&gt;
* Accessible design: information on how the network and its components work are public and accessible;&lt;br /&gt;
* Open participation: anyone can extend the network, respecting its design and its principles.&lt;br /&gt;
&lt;br /&gt;
====Political Achievements ====&lt;br /&gt;
At the same time as implementing its technology, Altermundi participated in the debate on the Digital Argentina Law approved in December 2014, achieving jointly with other sectors to include in the article 94 of the law the &amp;quot;promotion and protection of community networks&amp;quot; .&lt;br /&gt;
&lt;br /&gt;
On the other hand,  the work of Altermundi with the creation of these free and community networks, gave birth to a new ccooperation team that is developing Free-Mesh &amp;lt;ref&amp;gt;http://libre-mesh.org&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==== Desafíos ====&lt;br /&gt;
The main challenge of these free networks is to have access to a bandwidth at wholesale prices to connect to the rest of the Internet. While in Europe 1 megabytes per second cost around $ 0.78 per month, in Argentina 1 megabyte per second costs $ 40 per month, therefore more than 50 times the price in Europe.&lt;br /&gt;
&lt;br /&gt;
==Otros proyectos alternativos==&lt;br /&gt;
=== Guifi ===&lt;br /&gt;
[[File:guifi-logo.png|400px]]&lt;br /&gt;
&lt;br /&gt;
https://guifi.net/&lt;br /&gt;
&lt;br /&gt;
It is a telecommunications network as a common good. It currently has more than 30,000 active nodes within the network.&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Guifi · net is a telecommunications network in which individuals, organizations, companies and all types of entities participate by promoting and investing in a common infrastructure that provides them with access to telecommunications and the Internet of quality and at a fair price '' &amp;quot;&amp;lt;Ref&amp;gt;https://guifi.net/es/que_es &amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
An Open, Free and Neutral Network is defined as:&lt;br /&gt;
* It is open because it is universally offered to the participation of all without any kind of exclusion or discrimination and because it is informed at all times about how the network and its components work, allowing anyone to improve it.&lt;br /&gt;
* It is free because everyone can do what they want and enjoy the freedoms as foreseen in the reference of the general principles (section I), all this regardless of their level of participation in the network and without imposing terms and conditions Which contradict this agreement unilaterally.&lt;br /&gt;
* It is neutral because the network is independent of the contents, it does not condition them and, thus, they can circulate freely; Users can access and produce content regardless of financial possibilities or social conditions. When content is added to the network guifi.net is done in order to stimulate its appearance, better manage the network or simply as an exercise to incorporate content, but in no case with the aim of replacing or blocking other content.&lt;br /&gt;
&lt;br /&gt;
The Procommon of the RAAN (Open, Free and Neutral Network) is based on the following bases:&lt;br /&gt;
&lt;br /&gt;
* You are free to use the network for any purpose as long as you do not damage the operation of the network itself, the freedom of other users, and respect the conditions of the contents and services that circulate freely.&lt;br /&gt;
* You are free to know how the network, its components and its operation, you can also spread your spirit and operation freely.&lt;br /&gt;
* You are free to incorporate services and contents to the network with the conditions that you want.&lt;br /&gt;
* You are free to join the network and help to extend these freedoms and conditions.&lt;br /&gt;
&lt;br /&gt;
Map of nodes: https://guifi.net/es/node/17711/view/map&lt;br /&gt;
&lt;br /&gt;
Videos&lt;br /&gt;
http://guifitv.guifi.net/?q=node/31&lt;br /&gt;
http://media.guifi.net/&lt;br /&gt;
&lt;br /&gt;
Get involved!&lt;br /&gt;
The node is yours but the network is of all the people that connect.:&lt;br /&gt;
https://guifi.net/en/participa&lt;br /&gt;
&lt;br /&gt;
Routers and firmwares you can use to contribute to the network&lt;br /&gt;
https://guifi.net/en/firmware&lt;br /&gt;
&lt;br /&gt;
Joining guifi.net in three simple steps&amp;lt;ref&amp;gt; https://guifi.net/en/trespasos&amp;lt;/ref&amp;gt;&lt;br /&gt;
* Add a node&lt;br /&gt;
* Add a new router&lt;br /&gt;
* Add a bridge&lt;br /&gt;
&lt;br /&gt;
===Proyecto Serval ===&lt;br /&gt;
[[File:serval.png|400px]]&lt;br /&gt;
&lt;br /&gt;
http://www.servalproject.org/&lt;br /&gt;
&lt;br /&gt;
This project comes from a group of people in Australia who develop open source technology and free software to create direct connection between mobile phones, through the WiFI interfaces of the phones.&lt;br /&gt;
&lt;br /&gt;
In order to use this technology it is necessary to access as root user &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Root &amp;lt;/ref&amp;gt; to the mobile phone to be able to install a free software developed by Serval that allows the WiFi antenna In Ad-hoc type in order to create a Mesh Network &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Mesh_networking&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
You do not need an external WiFi infrastructure to the mobile phone, you simply need to activate the WiFi of the nearby mobile phones and this way you can exchange data through calls, messages, photos, etc. This data travels from one telephone to another, through the route within the connected telephone network. The services of a mobile phone company are not required. This technology allows you to make voice calls. Text messages and other data are communicated through storage and retransmission, a system known as rhizome.&lt;br /&gt;
&lt;br /&gt;
Wiki of the Serval project: http://developer.servalproject.org/dokuwiki/doku.php&lt;br /&gt;
&lt;br /&gt;
===Commotion Wireless===&lt;br /&gt;
[[File:comotion logocom.jpeg|400px]]&lt;br /&gt;
&lt;br /&gt;
https://commotionwireless.net&lt;br /&gt;
&lt;br /&gt;
A project developed by the Open Technology Institute &amp;lt;ref&amp;gt;https://www.newamerica.org/oti/ &amp;lt;/ref&amp;gt; which consists in creating mesh networks &amp;lt;ref&amp;gt;https: //wiki/Red_en_malla &amp;lt;/ref&amp;gt; &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Communication_in_the_Category &amp;lt;/ref&amp;gt;. This project has used Mobile ad-hoc network &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Mobile_ad_hoc_network &amp;lt;/ref&amp;gt;,  whcih are networks of mobile nodes connected via wireless signal.&lt;br /&gt;
&lt;br /&gt;
==Referencias== &lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
[[File:dany guzman.jpg|400px]]&lt;br /&gt;
&amp;lt;ref&amp;gt;Fotográfo: Daniel Guzman. Isla Negra, Chile. &amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Autonomous and Community Mobile Telephony ==&lt;br /&gt;
According to the International Telecommunication Union&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/International_Telecommunication_Union&amp;lt;/ref&amp;gt; there are between 2 and 3 billion people in the world who don't have access to a mobile phone network. This is mainly because telecommunications regulatory bodies only grant access to the mobile radio spectrum to large companies, and often restrict access to micro enterprises, for example small service providers to rural areas.&lt;br /&gt;
&lt;br /&gt;
It is widely assumed that the only way to communicate using mobile phones is through transnational telecoms corporations, and that a for-profit business model is the only viable way of setting up and sustaining a mobile phone network. That leaves many geographically remote communities and villages with low population densities, or with subsistence economies, that are never going to attract the large investment required from large companies to set up a mobile phone network. And sometimes these communities do not want services from a corporate provider anyway.&lt;br /&gt;
&lt;br /&gt;
From some of these communities new, creative and collaborative ways of providing telephony services are emerging that offer hope to marginalised rural communities everywhere. Below are a few of these alternative phone projects that are based on peoples' basic right to communicate.&lt;br /&gt;
&lt;br /&gt;
=== Rhizomatica ===&lt;br /&gt;
[[File:Untitled-2.jpg|400px]]&lt;br /&gt;
&lt;br /&gt;
The Rhizomatica organization is located in Oaxaca&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Oaxaca&amp;lt;/ref&amp;gt;, in the south east of Mexico.&lt;br /&gt;
&lt;br /&gt;
Rhizomatica works by creating bridges between indigenous communities in Mexico and engineers of open telecommunications systems to create mobile telephony infrastructure to strengthen the autonomy of indigenous peoples. In order to understand the origin and success of this autonomous mobile telephony project, it is important to understand its context.&lt;br /&gt;
&lt;br /&gt;
==== Context and history ====&lt;br /&gt;
Oaxaca is a complex and culturally diverse region; 17 indigenous peoples co-inhabit the territory. Oaxaca is mountainous, the territory is communal, and there are strong local government structures recognized by the Mexican constitution and international treaties. Oaxaca's economy is  based on agricultural subsistence.&lt;br /&gt;
&lt;br /&gt;
In the 1970s and 1980s, these peoples began their first communal enterprises for the management of common goods, such as forestry and aquifers, that were the precedent for the current communal telecoms enterprises. This complex context is the fertile ground for telecommunications infrastructure projects that strengthen the autonomy of indigenous peoples.&lt;br /&gt;
&lt;br /&gt;
From the 2006 Social Movement&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Asamblea_Popular_de_los_Pueblos_de_Oaxaca&amp;lt;/ref&amp;gt;, the native peoples of Oaxaca began work to set up their own means of communication, with special emphasis on community radio. Currently the Oaxaca state has the highest concentration of community radio in Mexico. Although there is no official census, social organizations estimate that there are between 60 and 100 community network projects currently operating in Oaxaca.&lt;br /&gt;
&lt;br /&gt;
Driven by the need for communication, the communal authorities of towns in Oaxaca approached big companies countless times to request mobile telephony services. But their requests were always rejected because of the small population and the high set-up costs. Because of this, communal villages worked with Rhizomatica to look for ways to construct mobile phone infrastructure that would strengthen the autonomy of their towns. This was how the Autonomous and Community Cellular Telephone project emerged.&lt;br /&gt;
&lt;br /&gt;
==== Infrastructure ====&lt;br /&gt;
In technical terms, the autonomous mobile telephony infrastructure consists of a&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Transceiver&amp;lt;/ref&amp;gt; transceiver with 5 watts of power that emits and receives 850 Mhz radio waves and an antenna that can cover up to 15 km of the surrounding area. The transceivers emit radio waves that require line of sight, so in mountainous terrain the location of the antenna has to be as high as possible to maximize range. Any type of phone can access these networks; a specific SIM card is not required. In the case of Oaxaca, the phone numbering system is based on the postal code assigned to that area. Administration and billing is set up so it can be easily translated into the original languages of the area.&lt;br /&gt;
&lt;br /&gt;
For more details about the system architecture, the hardware and software used, read the Rhizomatica wiki&lt;br /&gt;
http://wiki.rhizomatica.org/index.php/System_Architecture/es&lt;br /&gt;
[[File:Screenshot4.png|400px]]&lt;br /&gt;
[[File:Screenshot2.png|400px]]&lt;br /&gt;
&lt;br /&gt;
Currently (July 2016) the project involves 17 communities&amp;lt;ref&amp;gt;http://wiki.rhizomatica.org/index.php/Map_with_current_sites&amp;lt;/ref&amp;gt;, and some of them are interconnected. Each transceiver is owned by the communal governing body of each village. The cost per telephone registered in the network is 40 Mexican pesos per month, equivalent to 2 USD, for unlimited calls and text messages within the interconnected community or region. For out-of-town calls, such as the city of Oaxaca or a city in the United States, calls are made through a &amp;quot;Voice over IP&amp;quot; (VoIP) system&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Voz_sobre_protocolo_de_internet&amp;lt;/ref&amp;gt; offering network users the lowest rates available. &lt;br /&gt;
&lt;br /&gt;
To join the project, a community first needs to have in place a good internet connection. Usually this is set up through local micro-enterprises that use WiFi links to reach rural communities.&lt;br /&gt;
The cost of a computer, the importation of the equipment,  and the installation and training to manage the network is approximately 7,000 USD. Currently Rhizomatica uses NuRAN Wireless &amp;lt;ref&amp;gt;http://nuranwireless.com/&amp;lt;/ref&amp;gt;equipment among other providers. The hardware costs are expected to decrease in the future with the development of new open source hardware devices.&lt;br /&gt;
&lt;br /&gt;
The main requirements for the installation of an autonomous mobile telephone networks include:&lt;br /&gt;
- Vote of approval in the community assembly&lt;br /&gt;
- No existing network from another mobile phone company&lt;br /&gt;
- An Internet connection&lt;br /&gt;
&lt;br /&gt;
Rhizomatica currently has around 3,000 users of autonomous mobile telephony services in Oaxaca. Using Rhizmoatica as a model, a group of young computer students have developed a similar project on the Nicaraguan Atlantic coast called SayCel&amp;lt;ref&amp;gt;http://itp.junglebrains.com/saycel-community-cellular-networks/&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==== Political achievements ====&lt;br /&gt;
The achievement of Rhizomatica and the native peoples of Oaxaca is not only technical but also political.  Last June, 2016, the civil association Telecomunicaciones Indígenas Comunitarias (TIC AC), made up of the 17 Rhizomatica communities, won a 15-year concession to operate telecommunications networks in five states of the Mexican republic: Veracruz, Guerrero, Oaxaca, Puebla and Chiapas. This achievement sets a historic precedent in telecommunications in Mexico and in the world. The International Telecommunication Union now showcases Rhizomatica as an example for other governments in the region.&lt;br /&gt;
&lt;br /&gt;
==== Challenges ====&lt;br /&gt;
One of main challenges that Rhizomatica faces is enabling access to data for Internet browsing. Another challenge is the transformation from the customer-company relationship that people are used to with mobile networks, to one in which the network is in their own hands.&lt;br /&gt;
&lt;br /&gt;
==== Videos ====&lt;br /&gt;
To know more about the project, watch the following videos&lt;br /&gt;
Network of Santa María Yaviche: &lt;br /&gt;
{{#ev:vimeo|https://vimeo.com/97613709}}&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|https://www.youtube.com/watch?v=4cVnkOvUZtw}}&lt;br /&gt;
&lt;br /&gt;
Desinformemonos Video&lt;br /&gt;
{{#ev:youtube|https://www.youtube.com/watch?v=qQfwQ7sGvgM}}&lt;br /&gt;
&lt;br /&gt;
==== Press ====&lt;br /&gt;
WIRED article&lt;br /&gt;
English Version:&lt;br /&gt;
http://www.wired.com/2015/01/diy-cellular-phone-networks-mexico/&lt;br /&gt;
&lt;br /&gt;
Desinformemonos&lt;br /&gt;
http://desinformemonos.org.mx/la-telefonia-comunitaria-el-desafio-que-crece/&lt;br /&gt;
&lt;br /&gt;
About the 15 years concession&lt;br /&gt;
http://www.sinembargo.mx/23-07-2016/3071050&lt;br /&gt;
http://eleconomista.com.mx/industrias/2016/07/07/indigenas-oaxaca-seran-operadores-como-att-telcel-movistar&lt;br /&gt;
&lt;br /&gt;
==== Contact ====&lt;br /&gt;
[http://www.rhizomatica.org www.rhizomatica.org]&lt;br /&gt;
&lt;br /&gt;
rhizomaticomms[@]gmail.com&lt;br /&gt;
&lt;br /&gt;
[http://@rhizomatica https://twitter.com/rhizomatica]&lt;br /&gt;
&lt;br /&gt;
== Free and community WIFI networks==  &lt;br /&gt;
&lt;br /&gt;
=== Altermundi ===&lt;br /&gt;
[[File:altermundi.png|400px]]&lt;br /&gt;
&lt;br /&gt;
'''Altermundi “la pata tecnológica de ese otro mundo posible”'''&lt;br /&gt;
https://www.altermundi.net/&lt;br /&gt;
&lt;br /&gt;
==== History ====&lt;br /&gt;
Altermundi is a civil association in the province of Córdoba&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Provincia_de_C%C3%B3rdoba_%28Argentina%29&amp;lt;/ref&amp;gt; in Argentina&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Argentina&amp;lt;/ref&amp;gt;. Altermundi's mission is to create Internet infrastructure through the use of Free Software and very low cost hardware. Altermundi sets up decentralized wireless networks, using WiFi routers and &amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Firmware&amp;lt;/ref&amp;gt;firmware to modify the router's operation.ince then]&lt;br /&gt;
&lt;br /&gt;
&amp;quot;A community network is a network built, managed, administrated, by the people who are going to use it. It prioritizes local traffic, maintains peering agreements&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Peering&amp;lt;/ref&amp;gt; (Internet free transit) with any network that offers reciprocity. This was the Internet when it started, that was the original spirit, which has been lost. (Since then the) Internet has been closed and the big networks do not give peering to the people; they broke the model of peer to peer&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Peer-to-peer&amp;lt;/ref&amp;gt;. For us, community networks have two aims: giving concrete solutions to people of flesh and blood , and at the same time to &amp;quot;contaminate&amp;quot; the current Internet with the old spirit of the Internet &amp;quot;Nicolás Echániz&amp;lt;ref&amp;gt;https://twitter.com/nicoechaniz&amp;lt;/ref&amp;gt; founding member of Altermundi.&lt;br /&gt;
&lt;br /&gt;
The main advantage of community networks is that they allow access to the Internet in villages where there is no access to commercial phone services. Above all they are very simple to manage by people in the community, without the need for specialized knowledge in electronics or computing, and at an affordable price. In addition, anyone can extend the network, if they respect its design and its principles, because its growth is not based on a for-profit business model.&lt;br /&gt;
&lt;br /&gt;
Through the Altermundi network people have access to a local chat service, to online transmission of local community radio, to VoIP calls, to share files between peers and to games. In Argentina, these networks are located in Delta de Tigre in Buenos Aires and the Valley of Paravachasca in Cordoba.&lt;br /&gt;
&lt;br /&gt;
==== Infrastructure ====&lt;br /&gt;
The hardware&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Hardware&amp;lt;/ref&amp;gt; consists of a router and an antenna, equipment to adapt the router, and a cable that connects to the antenna in position. Firmware (operating system) is installed in  the routers that allows auto-configuration and other programs for personalization and network monitoring.&lt;br /&gt;
&lt;br /&gt;
Altermundi modifies the routers so that when connecting with a directional antenna the WiFi signal can cover a few kilometers. In this way a network of WiFi devices is built that can exchange data between people within a town or region, and can also connect to the Internet and other community networks.&lt;br /&gt;
&lt;br /&gt;
''''''What is the difference between a Free Network and a Community Network?''''''&lt;br /&gt;
Characteristics of a Free Network:&lt;br /&gt;
&lt;br /&gt;
* Free use: the network can be used by its participants to offer and receive any type of service that does not affect its operation;&lt;br /&gt;
* Neutrality: the network does not inspect or modify data flows within the network beyond what is necessary for its operation;&lt;br /&gt;
* Free interconnection: the network allows freedom and free services, and the free flow of data with other networks that respect the same conditions;&lt;br /&gt;
* Free transit: it provides other free networks access to the networks, which it maintains with voluntary agreements for free interconnection.&lt;br /&gt;
&lt;br /&gt;
The goal of free networks is to return common sense to the Internet structure, allowing the free flow of information, making the most of infrastructure, and lowering costs so that small Internet businesses can be set easily in areas where Internet access is unfeasible. In this sense community networks are an expression of free networks, and they play a fundamental role in the community through the following characteristics:&lt;br /&gt;
&lt;br /&gt;
* Collective ownership: its infrastructure is owned by the community that deploys it.&lt;br /&gt;
* Social management: the network is managed by the same community.&lt;br /&gt;
* Accessible design: information on how the network and its components work are public and accessible.&lt;br /&gt;
* Open participation: anyone can extend the network, if they respect its design and its principles.&lt;br /&gt;
&lt;br /&gt;
====Political Achievements ====&lt;br /&gt;
At the same time as implementing its networks, Altermundi also participated in the debate on the Digital Argentina Law approved in December 2014, securing with other organizations the inclusion in article 94 of the law the &amp;quot;promotion and protection of community networks&amp;quot; .&lt;br /&gt;
&lt;br /&gt;
Furthermore,  the work of Altermundi on creating free and community networks, led to a new co-operation team that is developing Free-Mesh &amp;lt;ref&amp;gt;http://libre-mesh.org&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==== Desafíos ====&lt;br /&gt;
The main challenge of these free networks is to have access to bandwidth at wholesale prices to connect to the rest of the Internet. While in Europe 1 megabyte per second costs around 0.78 USD per month, in Argentina 1 megabyte per second costs 40 USD per month, more than 50 times the price in Europe.&lt;br /&gt;
&lt;br /&gt;
==Otros proyectos alternativos==&lt;br /&gt;
=== Guifi ===&lt;br /&gt;
[[File:guifi-logo.png|400px]]&lt;br /&gt;
&lt;br /&gt;
https://guifi.net/&lt;br /&gt;
&lt;br /&gt;
Guifi is a telecommunications network as a common good. It currently has more than 30,000 active nodes within the network.&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Guifi · net is a telecommunications network in which individuals, organizations, companies and all types of entities participate by promoting and investing in a common infrastructure that provides them with access to telecommunications and the Internet {with} quality and at a fair price '' &amp;quot;&amp;lt;Ref&amp;gt;https://guifi.net/es/que_es &amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
An Open, Free and Neutral Network is defined as:&lt;br /&gt;
* It is open because it is universally offered to the participation of all without any kind of exclusion or discrimination and because it is open at all times about how the network and its components work, allowing anyone to improve it.&lt;br /&gt;
* It is free because everyone can do what they want and enjoy the freedoms as oultined in the reference of the general principles (section I), regardless of their level of participation in the network, and without imposing terms and conditions which unilaterally contradict this agreement.&lt;br /&gt;
* It is neutral because the network is independent of the contents, it does not condition them and, thus, they can circulate freely; Users can access and produce content regardless of financial possibilities or social conditions. When content is added to the network guifi.net, it is done to improve its appearance, better manage the network or simply to incorporate content, but in no case with the aim of replacing or blocking other content.&lt;br /&gt;
&lt;br /&gt;
The Procommon of the RAAN (Open, Free and Neutral Network) is based on the following principles:&lt;br /&gt;
&lt;br /&gt;
* You are free to use the network for any purpose as long as you do not damage the operation of the network itself, the freedom of other users, and respect the conditions of the contents and services that circulate freely.&lt;br /&gt;
* You are free to know how the network, its components and its operation works, and you can also spread your spirit and operation freely.&lt;br /&gt;
* You are free to incorporate services and contents to the network with the conditions that you want.&lt;br /&gt;
* You are free to join the network and help to extend these freedoms and conditions.&lt;br /&gt;
&lt;br /&gt;
Map of nodes: https://guifi.net/es/node/17711/view/map&lt;br /&gt;
&lt;br /&gt;
Videos&lt;br /&gt;
http://guifitv.guifi.net/?q=node/31&lt;br /&gt;
http://media.guifi.net/&lt;br /&gt;
&lt;br /&gt;
Get involved!&lt;br /&gt;
The node is yours but the network is of all the people that connect:&lt;br /&gt;
https://guifi.net/en/participa&lt;br /&gt;
&lt;br /&gt;
Routers and firmwares you can use to contribute to the network&lt;br /&gt;
https://guifi.net/en/firmware&lt;br /&gt;
&lt;br /&gt;
Joining guifi.net in three simple steps&amp;lt;ref&amp;gt; https://guifi.net/en/trespasos&amp;lt;/ref&amp;gt;&lt;br /&gt;
* Add a node&lt;br /&gt;
* Add a new router&lt;br /&gt;
* Add a bridge&lt;br /&gt;
&lt;br /&gt;
===Serval Project ===&lt;br /&gt;
[[File:serval.png|400px]]&lt;br /&gt;
&lt;br /&gt;
http://www.servalproject.org/&lt;br /&gt;
&lt;br /&gt;
This project comes from a group of people in Australia who develop open source technology and free software to create direct connections between mobile phones, through  a mobile phone's WiFI interface.&lt;br /&gt;
&lt;br /&gt;
To use Serval it is necessary to access a phone as root user &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Root &amp;lt;/ref&amp;gt; to install Serval free software that allows the WiFi antenna to be used for an Ad-hoc type mesh network &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Mesh_networking&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
To use Serval you do not need an external WiFi infrastructure other than your mobile phone; you simply need to connect via WiFi to nearby mobile phones to exchange data through calls, messages, photos, etc. This data travels directly from one telephone to another, so the services of a mobile phone company are not required. Serval allows you to make voice calls. Text messages and other data are communicated through storage and retransmission, a system known as rhizome.&lt;br /&gt;
&lt;br /&gt;
Wiki of the Serval project: http://developer.servalproject.org/dokuwiki/doku.php&lt;br /&gt;
&lt;br /&gt;
===Commotion Wireless===&lt;br /&gt;
[[File:comotion logocom.jpeg|400px]]&lt;br /&gt;
&lt;br /&gt;
https://commotionwireless.net&lt;br /&gt;
&lt;br /&gt;
A project developed by the Open Technology Institute &amp;lt;ref&amp;gt;https://www.newamerica.org/oti/ &amp;lt;/ref&amp;gt; which consists of creating mesh networks &amp;lt;ref&amp;gt;https: //wiki/Red_en_malla &amp;lt;/ref&amp;gt; &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Communication_in_the_Category &amp;lt;/ref&amp;gt;. This project has used Mobile ad-hoc networks &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Mobile_ad_hoc_network &amp;lt;/ref&amp;gt;,  which are networks of mobile nodes connected via wireless signal.&lt;br /&gt;
&lt;br /&gt;
==Referencias== &lt;br /&gt;
 [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Self_care,_Emotions&amp;diff=8978</id>
		<title>Self care, Emotions</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Self_care,_Emotions&amp;diff=8978"/>
				<updated>2017-03-16T17:24:03Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Self care, Emotions&lt;br /&gt;
|Kind of learning session=Holistic&lt;br /&gt;
|Tutorial category=Icebreaking, Energiser&lt;br /&gt;
|Duration (hours)=45 mins&lt;br /&gt;
|Learning objectives=Download emotions accumulated during the day and acquire tools to work emotions (in particular anxiety) both personally and collectively&lt;br /&gt;
|Methodology=For a few minutes, we danced together to the sound of relaxing drums because, as Emma Goldman, Jane Barry and Jelena Dordevic put it: What good is revolution, if we can not dance?&lt;br /&gt;
&lt;br /&gt;
Exercise 1. Embrace Fingers&lt;br /&gt;
&lt;br /&gt;
We listen to a didactic radio capsule.&lt;br /&gt;
&lt;br /&gt;
Summary:&lt;br /&gt;
&lt;br /&gt;
When you feel a strong emotion, embrace your finger with the other hand and hold it for 2-5 minutes until the level of emotion drops. For each finger there is a connection of energy that corresponds to an emotion as shown in the following way:&lt;br /&gt;
&lt;br /&gt;
Thumb: is for tears, pain and emotional pain. Holding fingers does not prevent tears or pain, but allows the energy to move until the person calms down. Grab your thumb, breathe deeply and exhale the pain and sorrow you feel. Hold your finger until you feel a pulse of energy.&lt;br /&gt;
&lt;br /&gt;
Index: it is for fear, it is important to listen to the fear as one would hear a guide. Fear can tell us many things about your environment, our physical well-being and our growth. It is what we do with fear that is important. If you are afraid, instead of paralysing, grab your index finger to make a wise decision in the situation - run away, stay or react. With traumatic stress a person can continuously panic in their body-spirit. Using the index finger is a good way to learn how to work with fear, rather than being a victim of fear. As you hold your index finger, exhale and let go of fear, and inhale courage and strength to be.&lt;br /&gt;
&lt;br /&gt;
Medium: is for anger and rage. Anger is a natural and normal emotion in many situations. Fury can result in violence toward others or toward ourselves. Suppressed anger or denial of our own depths of fury can result in passive-aggressive behavior or many physical symptoms in the body that include arthritis, ulcers, migraines, and knots in the muscles of various parts of the body. Hold your middle finger, exhale and let go of all the fury and anger, inhale energy and creative passion in your being.&lt;br /&gt;
&lt;br /&gt;
Override: is for anxiety and nervousness. As many people unconsciously play with their ringtones when they are afflicted and annoyed by the constant mental noise. Annulment helps to discharge unnecessary distress and anxiety, saving energy for action. Take a deep breath and grab your ring. Exhale, letting go of all the worries and anxiety. Inhale with a deep sense of peace and security amid the problems of life, knowing that you are spiritually backed and cared for&lt;br /&gt;
&lt;br /&gt;
Little finger: it is for self-esteem when one feels victimized by circumstances. Holding the little finger is a way to control feelings of unworthiness and low self-esteem. To stop feeling like a victim, it is important to first recognize what you get when you feel that way - attention, hurt, the concern of others. Placing yourself in a state of power and self-esteem gives you many rewards and a true sense of appreciation in the eyes of others. Hold your little finger, breathe deeply, exhale and let go of insecurity and lack of self-esteem.&lt;br /&gt;
&lt;br /&gt;
Exercises: 2. Download Anxiety&lt;br /&gt;
&lt;br /&gt;
Emotional release techniques are very useful to unlock and heal strong emotions, fears, anxiety, emotional pain, anger, traumatic memories, phobias and addictions, as well as to alleviate pain symptoms such as headache or body pain. .&lt;br /&gt;
&lt;br /&gt;
The technique is based on the theory of the energy field of the body, mind and spirit, together with the meridian theory of oriental medicine. Problems, traumas, anxiety and pain can cause a blockage in the travel of energy in the body. Tapping or acupressure at the points connected to the energy channels or meridians can help unlock the congested energy and promote a fluid or healthy travel of energy in the body and in the mental field.&lt;br /&gt;
&lt;br /&gt;
Steps:&lt;br /&gt;
&lt;br /&gt;
    Sit very comfortable without crossing feet&lt;br /&gt;
    Think of a problem that can be used to measure your level of anxiety: Choose to work on a problem, a concern, a phobia, an anxiety, a traumatic memory, or some negative thinking.&lt;br /&gt;
    Using a scale of 0 to 10 measures the level of anxiety you feel when you think about it. (0 = no anxiety and 10 = maximum anxiety level).&lt;br /&gt;
    Give 7 or 9 taps to the identified acupressure points below&lt;br /&gt;
    Breathe deeply as you tap the fingers with your index and middle fingers at the indicated points:&lt;br /&gt;
&lt;br /&gt;
1. The points where the eyebrows begin 2. The points where the eyebrows end 3. The points on the cheekbones, under the pupils 4. The point under the nose 5. The point on the chin, under the lips 6. The points about 10cm below the armpits 7. The points below the clavicles by the sternum.&lt;br /&gt;
&lt;br /&gt;
    Touch the dot next to her hand and repeat 3 times: &amp;quot;Even though I have this problem, I'm fine, and I work it!&amp;quot;&lt;br /&gt;
    Repeat the sequence presented in points 2 and 3:&lt;br /&gt;
    Repeat this sequence until your anxiety level has dropped to 0-2&lt;br /&gt;
    Give a gentle massage on the &amp;quot;sore spot&amp;quot; that lies on the left side of the chest, about 5cm below the left side of the clavicle and 4 or 5cm next to the sternum.&lt;br /&gt;
|Number of facilitators involved=1 or 2&lt;br /&gt;
|Technical needs=Relaxing area, cushions; sound system&lt;br /&gt;
|Theoretical and on line resources=Mãozada − The Handshake manual:&lt;br /&gt;
https://hackingwithcare.in/wiki/doku.php/maozada https://hackingwithcare.in/wiki/lib/exe/fetch.php/maozada_hackingwithcare_handsmassage_manual.pdf&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Tutorial&lt;br /&gt;
|Title of the tutorial=Self care, Emotions&lt;br /&gt;
|Kind of learning session=Holistic&lt;br /&gt;
|Tutorial category=Icebreaking, Energiser&lt;br /&gt;
|Duration (hours)=45 mins&lt;br /&gt;
|Learning objectives=Download emotions accumulated during the day and acquire tools to work emotions (in particular anxiety) both personally and collectively&lt;br /&gt;
|Methodology=For a few minutes, we danced together to the sound of relaxing drums because, as Emma Goldman, Jane Barry and Jelena Dordevic put it: What good is revolution, if we can not dance?&lt;br /&gt;
&lt;br /&gt;
Exercise 1. Embrace Fingers&lt;br /&gt;
&lt;br /&gt;
We listen to an audio recording.&lt;br /&gt;
&lt;br /&gt;
Summary:&lt;br /&gt;
&lt;br /&gt;
When you feel a strong emotion, grasp your fingers on one hand with the other hand and hold for 2-5 minutes until the level of emotion drops. For each finger there is a connection of energy that corresponds to an emotion:&lt;br /&gt;
&lt;br /&gt;
Thumb: is for tears, pain and emotional pain. Holding fingers does not prevent tears or pain, but allows the energy to move until the person calms down. Grab your thumb, breathe deeply and exhale the pain and the sorrow you feel. Hold your thumb until you feel a pulse of energy.&lt;br /&gt;
&lt;br /&gt;
Index: is for fear - it is important to listen to the fear as one would hear a guide. Fear can tell us many things about our environment, our physical well being and our growth. It is what we do with fear that is important. If you are afraid, instead of feeling paralyzed, grab your index finger to make a good decision at critical moments - run away, stay or react. With traumatic stress a person can feel trapped in a spiral of mental and physical panic. Using the index finger is a good way to learn how to work with fear, rather than be a victim of fear. As you hold your index finger, exhale and let go of fear, and inhale courage and strength.&lt;br /&gt;
&lt;br /&gt;
Medium: is for anger and rage. Anger is a natural and normal emotion in many situations. Fury can result in violence toward others or toward ourselves. Suppressed anger or denial of our own depths of fury can result in passive-aggressive behavior or many physical symptoms in the body, including arthritis, ulcers, migraines, and knots in the muscles of various parts of the body. Hold your middle finger, exhale and let go of all the fury and anger, inhale energy and creative passion in your being.&lt;br /&gt;
&lt;br /&gt;
Override: is for anxiety and nervousness, such as when people unconsciously play with their ringtones when they are afflicted and annoyed by the constant mental noise around them. Annulment helps to discharge unnecessary distress and anxiety, saving energy for action. Take a deep breath and grab your ring finger. Exhale,  and let go of all your worries and anxiety. Inhale with a deep sense of peace and security amid the problems of life, knowing that you are spiritually supported and cared for.&lt;br /&gt;
&lt;br /&gt;
Little finger: is for self-esteem when one feels victimized by circumstances. Holding the little finger is a way to control feelings of unworthiness and low self-esteem. To stop feeling like a victim, it is important to first recognize what you get when you feel that way - attention, hurt, the concern of others. Placing yourself in a state of power and self-esteem gives you many rewards and a true sense of appreciation in the eyes of others. Hold your little finger, breathe deeply, exhale and let go of insecurity and low self-esteem.&lt;br /&gt;
&lt;br /&gt;
Exercises: 2. Download Anxiety&lt;br /&gt;
&lt;br /&gt;
Emotional release techniques are very useful to unlock and heal strong negative emotions; fears, anxiety, emotional pain, anger, traumatic memories, phobias and addictions, as well as to alleviate pain symptoms such as headache or body pain.&lt;br /&gt;
&lt;br /&gt;
This technique is based on the theory of the energy field of the body, mind and spirit, together with the meridian theory of oriental medicine. Problems, traumas, anxiety and pain can cause a blockage in the travel of energy in the body. Tapping or acupressure at the points connected to the energy channels or meridians can help unlock the congested energy and promote a fluid or healthy flow of energy through the body and mind.&lt;br /&gt;
&lt;br /&gt;
Steps:&lt;br /&gt;
&lt;br /&gt;
    Sit very comfortably without crossing your feet&lt;br /&gt;
    Think of a problem that can be used to measure your level of anxiety: Choose to work on a problem, a concern, a phobia, an anxiety, a traumatic memory, or some negative thinking.&lt;br /&gt;
    Using a scale of 0 to 10 measure the level of anxiety you feel when you think about it. (0 = no anxiety and 10 = maximum anxiety level).&lt;br /&gt;
    Give 7 or 9 taps to the acupressure points identified below&lt;br /&gt;
    Breathe deeply as you tap the fingers with your index and middle fingers at these points:&lt;br /&gt;
&lt;br /&gt;
1. The points where the eyebrows begin 2. The points where the eyebrows end 3. The points on the cheekbones, under the pupils 4. The point under the nose 5. The point on the chin, under the lips 6. The points about 10cm below the armpits 7. The points below the clavicle (collar bone) by the sternum.&lt;br /&gt;
&lt;br /&gt;
    Touch the dot next to your hand and repeat 3 times: &amp;quot;Even though I have this problem, I'm fine, and I work it!&amp;quot;&lt;br /&gt;
    Repeat the sequence presented in points 2 and 3:&lt;br /&gt;
    Repeat this sequence until your anxiety level has dropped to 0-2&lt;br /&gt;
    Give a gentle massage on the &amp;quot;sore spot&amp;quot; that lies on the left side of the chest, about 5cm below the left side of the clavicle (collar bone) and 4 or 5cm along from the sternum.&lt;br /&gt;
|Number of facilitators involved=1 or 2&lt;br /&gt;
|Technical needs=Relaxing area, cushions; sound system&lt;br /&gt;
|Theoretical and on line resources=Mãozada − The Handshake manual:&lt;br /&gt;
https://hackingwithcare.in/wiki/doku.php/maozada https://hackingwithcare.in/wiki/lib/exe/fetch.php/maozada_hackingwithcare_handsmassage_manual.pdf&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Self_care,_Body&amp;diff=8977</id>
		<title>Self care, Body</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Self_care,_Body&amp;diff=8977"/>
				<updated>2017-03-16T17:07:09Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Self care, Body&lt;br /&gt;
|Kind of learning session=Holistic&lt;br /&gt;
|Tutorial category=Icebreaking, Energiser&lt;br /&gt;
|Duration (hours)=45 mins&lt;br /&gt;
|Learning objectives=Connect with the body and release physical stress accumulated these days&lt;br /&gt;
|Methodology='''Exercises 1'''&lt;br /&gt;
&lt;br /&gt;
Various stretching and tension exercises on hands / back / arms&lt;br /&gt;
The explanatory video can be found at the following link: https://archive.org/details/BOOTSEQUENCE&lt;br /&gt;
&lt;br /&gt;
'''Exercises: 2'''&lt;br /&gt;
&lt;br /&gt;
Rest your eyes&lt;br /&gt;
&lt;br /&gt;
Closing our eyes we perform an exercise to concentrate and rest our eyes. Women activists who work for a long time in the computer often suffer from sleep disorders, concentration and / or seen by over-exposure to computer screens. This exercise helps to lower latency and affectation in the eyes.&lt;br /&gt;
 &lt;br /&gt;
With our eyes closed, in a guided meditation, we are walking with our eyes an imaginary clock:&lt;br /&gt;
1. First we walk the clock starting with point 12, going to point 3, point 6, point 9 and we return to point 12. We stop one minute for each point, Repeat the exercise twice&lt;br /&gt;
2. Now we go through the clock and stop at all the numbers on the clock: we start at 12 and we run: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11 and back to 12. We stop Minute for each point.&lt;br /&gt;
3. We remain silent for two minutes with our eyes closed and we gently open our eyes.&lt;br /&gt;
&lt;br /&gt;
'' 'Exercises: 3. Release tensions in the neck and back' ''&lt;br /&gt;
&lt;br /&gt;
Based on the technique of acupressure, we are going to help that the energy accumulated in the back and neck flow, we will press lightly with our index finger acupressure points.&lt;br /&gt;
 &lt;br /&gt;
Through this technique is made a direct connection with the energy of another person, therefore it is necessary to be very focused, calm and aware that we will share our energy with our partner.&lt;br /&gt;
Before we begin, we have to concentrate with a small two-minute meditation with our eyes closed, this is also the time to protect ourselves.&lt;br /&gt;
 &lt;br /&gt;
Steps&lt;br /&gt;
 &lt;br /&gt;
1. Lightly press with your index fingers the points located on the dimple next to the shoulder blades.&lt;br /&gt;
2. Press lightly with your index fingers the points located at the base of the neck&lt;br /&gt;
3. Press lightly with your index fingers the points located in the neck just below where the neck begins&lt;br /&gt;
4. After releasing energy, the people who worked together are thankful ..&lt;br /&gt;
  &lt;br /&gt;
'' 'Discussion: What did I notice? What did I build and need?&lt;br /&gt;
&lt;br /&gt;
We shared the different emotions with which we connected the exercises. Several companions were able to release emotions they could not connect with years ago. We closed by thanking each other for their trust and we share some happy moment together.&lt;br /&gt;
|Number of facilitators involved=1 or 2&lt;br /&gt;
|Technical needs=relaxing area, cushions, sound system&lt;br /&gt;
|Theoretical and on line resources=Bootsequence from Hacking with care:&lt;br /&gt;
https://archive.org/details/BOOTSEQUENCE&lt;br /&gt;
&lt;br /&gt;
Music:&lt;br /&gt;
https://www.youtube.com/watch?v=RLszb1cITus&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Tutorial&lt;br /&gt;
|Title of the tutorial=Self care, Body&lt;br /&gt;
|Type of learning session=Holistic&lt;br /&gt;
|Tutorial category=Icebreaking, Energizer&lt;br /&gt;
|Duration (hours)=45 mins&lt;br /&gt;
|Learning objectives=Connect with the body and release accumulated physical stress&lt;br /&gt;
|Methodology='''Exercises 1'''&lt;br /&gt;
&lt;br /&gt;
Various stretching and tension exercises on hands / back / arms&lt;br /&gt;
The explanatory video can be found at the following link: https://archive.org/details/BOOTSEQUENCE&lt;br /&gt;
&lt;br /&gt;
'''Exercises: 2'''&lt;br /&gt;
&lt;br /&gt;
Rest your eyes&lt;br /&gt;
&lt;br /&gt;
Firstly, we close our eyes so we can perform an exercise to concentrate and rest our eyes. Women activists who work with computers for long hours often suffer from sleep disorders, concentration problems and other issues caused by prolonged-exposure to computer screens. This exercise helps to rest and relieve your eyes if you suffer from these problems.&lt;br /&gt;
 &lt;br /&gt;
In a guided meditation with our eyes closed, we are walking with our eyes around an imaginary clock:&lt;br /&gt;
1. First we walk the clock starting with point 12, going to point 3, point 6, point 9 and we return to point 12. We stop one minute for each point. Repeat the exercise twice&lt;br /&gt;
2. Now we go through the clock and stop at all the numbers on the clock: we start at 12 and we run: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11 and back to 12. We stop Minute for each point.&lt;br /&gt;
3. We remain silent for two minutes with our eyes closed and we gently open our eyes.&lt;br /&gt;
&lt;br /&gt;
'' 'Exercises: 3. Release tensions in the neck and back' ''&lt;br /&gt;
&lt;br /&gt;
Based on the technique of acupressure, we are going to help the energy accumulated in the back and neck flow freely; we will press lightly with our index finger on acupressure points.&lt;br /&gt;
 &lt;br /&gt;
Through this technique we make a direct connection with the energy of another person, so it is necessary to be very focused, calm and to be ready  to share our energy with our partner.&lt;br /&gt;
&lt;br /&gt;
Before we begin, we have to concentrate with a small two-minute meditation with our eyes closed. This is also the time to protect ourselves.&lt;br /&gt;
 &lt;br /&gt;
Steps&lt;br /&gt;
 &lt;br /&gt;
1. Lightly press with your index fingers on the points located on the dimple next to the shoulder blades.&lt;br /&gt;
2. Press lightly with your index fingers on the points located at the base of the neck.&lt;br /&gt;
3. Press lightly with your index fingers on the points located in the neck just below where the neck begins.&lt;br /&gt;
4. After releasing energy, the people who worked together thank each other ..&lt;br /&gt;
  &lt;br /&gt;
'' 'Discussion: What did I notice? What did I build and need?&lt;br /&gt;
&lt;br /&gt;
We shared the different emotions with which we connected the exercises. Several companions were able to release emotions that they could not connect with years ago. &lt;br /&gt;
We closed by thanking each other for our shared trust and we shared some happy moments together.&lt;br /&gt;
&lt;br /&gt;
|Number of facilitators involved=1 or 2&lt;br /&gt;
|Technical needs=relaxing area, cushions, sound system&lt;br /&gt;
|Theoretical and on line resources=Bootsequence from Hacking with care:&lt;br /&gt;
https://archive.org/details/BOOTSEQUENCE&lt;br /&gt;
&lt;br /&gt;
Music:&lt;br /&gt;
https://www.youtube.com/watch?v=RLszb1cITus&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Self_Care,_Concentration&amp;diff=8976</id>
		<title>Self Care, Concentration</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Self_Care,_Concentration&amp;diff=8976"/>
				<updated>2017-03-16T16:49:50Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Self Care, Concentration&lt;br /&gt;
|Kind of learning session=Holistic&lt;br /&gt;
|Tutorial category=Icebreaking, Energiser&lt;br /&gt;
|Duration (hours)=45 mins&lt;br /&gt;
|Learning objectives=Tools to concentrate, handle situations of crisis / anxiety / stress&lt;br /&gt;
|Methodology=Concentration exercise: We listen to a didactic radio capsule to make our breath conscious&lt;br /&gt;
&lt;br /&gt;
'' 'Exercises: 1. Hold the body' ''&lt;br /&gt;
&lt;br /&gt;
This technique brings peace and tranquillity to people who go through a moment of acute stress situation of anxiety, fear, sadness, despondency and so on. We can use it to lower a crisis situation with a partner&lt;br /&gt;
Through this technique is made a direct connection with the energy of the person affected, therefore it is necessary to be very focused, calm and aware that we will share love, peace, harmony and tranquillity with our companion.&lt;br /&gt;
Before we begin, we have to concentrate, a small two-minute meditation with closed eyes.&lt;br /&gt;
&lt;br /&gt;
''Steps:'''&lt;br /&gt;
&lt;br /&gt;
1. Hold the forehead and base of the skull, placing the hands gently without touching the head. For 3 to 5 minutes.&lt;br /&gt;
2. Hold the crown of the head with your fingertips on the forehead. For 3 to 5 minutes.&lt;br /&gt;
3. Hold your shoulders. For 3 to 5 minutes.&lt;br /&gt;
4. Hold the part over the sternum (chest) and behind the heart (back). For 3 to 5 minutes.&lt;br /&gt;
&lt;br /&gt;
'' 'Exercises: 2. &amp;quot;Switching&amp;quot; (guided fantasy)' ''&lt;br /&gt;
&lt;br /&gt;
To focus the flow of energy&lt;br /&gt;
&lt;br /&gt;
'''Steps:'''&lt;br /&gt;
&lt;br /&gt;
     Sit comfortably and breathe deeply.&lt;br /&gt;
&lt;br /&gt;
     Cross left ankle over right ankle&lt;br /&gt;
&lt;br /&gt;
     Extend your hands to the front. He turns his hands with his thumbs towards the earth.&lt;br /&gt;
&lt;br /&gt;
     Cross your right hand over your left hand. Interlacing the fingers of the hands forming a fist.&lt;br /&gt;
&lt;br /&gt;
     With a fist of the hands touches the center of your sternum.&lt;br /&gt;
&lt;br /&gt;
     Close your eyes, breathe deeply and relax the entire body. Imagine that you can go down to a place in the center of your being.&lt;br /&gt;
&lt;br /&gt;
(You can imagine a center below the navel in the center of the abdomen.) For the people of China this center is called the Dantien. For people from India this is called la Hara).&lt;br /&gt;
&lt;br /&gt;
Relax the tongue inside the mouth and with the tip of the tongue touch behind the upper teeth.&lt;br /&gt;
&lt;br /&gt;
     Breathe deeply and let go of all thoughts. Rest in peace and deep silence for a few minutes.&lt;br /&gt;
&lt;br /&gt;
     After two or three minutes, relax your hands on your legs.&lt;br /&gt;
&lt;br /&gt;
     Take a deep breath and slowly open your eyes.&lt;br /&gt;
&lt;br /&gt;
     Stretch your hands and arms.&lt;br /&gt;
&lt;br /&gt;
'' 'Discussion: Effect of stress and trauma on hacktivists' ''&lt;br /&gt;
&lt;br /&gt;
We share the importance of being able to connect with yourself, with your emotions and how powerful meditation is for it.&lt;br /&gt;
 &lt;br /&gt;
We share diverse experiences of stress, care, lack of care and impacts on the bodies of activists&lt;br /&gt;
  &lt;br /&gt;
'''Closing:'''&lt;br /&gt;
     &lt;br /&gt;
We closed the session with an exercise of collective containment hugging and mesándonos in circle.&lt;br /&gt;
|Number of facilitators involved=1 or 2&lt;br /&gt;
|Technical needs=Comfortable and relaxing space, Computer and small audio system&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Tutorial&lt;br /&gt;
|Title of the tutorial=Self Care, Concentration&lt;br /&gt;
|Kind of learning session=Holistic&lt;br /&gt;
|Tutorial category=Icebreaking, Energizer&lt;br /&gt;
|Duration (hours)=45 mins&lt;br /&gt;
|Learning objectives=Tools to concentrate, handle situations of crisis / anxiety / stress&lt;br /&gt;
|Methodology=Concentration exercise: We listen to a didactic radio capsule to make our breath conscious&lt;br /&gt;
&lt;br /&gt;
'' 'Exercises: 1. Hold the body' ''&lt;br /&gt;
&lt;br /&gt;
This exercise is carried out with a partner to bring peace and calm at moments of acute stress, anxiety, fear, despondency and in other situations.&lt;br /&gt;
&lt;br /&gt;
By using this technique, a direct connection is made with the energy of the person affected, therefore it is necessary to be very focused, calm and aware that we will share love, peace, harmony and tranquillity with our companion.&lt;br /&gt;
&lt;br /&gt;
Before we begin, we have to concentrate, so to start there is a short two-minute meditation with eyes closed.&lt;br /&gt;
&lt;br /&gt;
''Steps:'''&lt;br /&gt;
&lt;br /&gt;
1. Hold the forehead and base of your partner's skull, placing the hands gently without touching the head for for 3 to 5 minutes. (?? - is this possible?)&lt;br /&gt;
2. Hold the crown of the head with your fingertips on the forehead for 3 to 5 minutes.&lt;br /&gt;
3. Hold the shoulders for 3 to 5 minutes.&lt;br /&gt;
4. Hold the point over the sternum (chest) and behind the heart (back) for 3 to 5 minutes.&lt;br /&gt;
&lt;br /&gt;
'' 'Exercises: 2. &amp;quot;Switching&amp;quot; (guided imagination)' ''&lt;br /&gt;
&lt;br /&gt;
To focus the flow of energy&lt;br /&gt;
&lt;br /&gt;
'''Steps:'''&lt;br /&gt;
&lt;br /&gt;
     Sit comfortably and breathe deeply.&lt;br /&gt;
&lt;br /&gt;
     Cross your left ankle over your right ankle.&lt;br /&gt;
&lt;br /&gt;
     Extend your hands to the front then turn your hands with thumbs towards the earth.&lt;br /&gt;
&lt;br /&gt;
     Cross your right hand over your left hand, interlacing the fingers of your hands to form a fist.&lt;br /&gt;
&lt;br /&gt;
     With your fist touch the center of your sternum.&lt;br /&gt;
&lt;br /&gt;
     Close your eyes, breathe deeply and relax the entire body. Imagine that you can go down to a place in the center of your being.&lt;br /&gt;
&lt;br /&gt;
(You can imagine a center below the navel in the center of the abdomen.) For the people of China this center is called the Dantien. For people from India this is called la Hara).&lt;br /&gt;
&lt;br /&gt;
Relax the tongue inside the mouth and with the tip of the tongue touch behind the upper teeth.&lt;br /&gt;
&lt;br /&gt;
     Breathe deeply and let go of all thoughts. Rest in peace and deep silence for a few minutes.&lt;br /&gt;
&lt;br /&gt;
     After two or three minutes, relax your hands and place them on your legs.&lt;br /&gt;
&lt;br /&gt;
     Take a deep breath and slowly open your eyes.&lt;br /&gt;
&lt;br /&gt;
     Stretch your hands and arms.&lt;br /&gt;
&lt;br /&gt;
'' 'Discussion: Effect of stress and trauma on hacktivists' ''&lt;br /&gt;
&lt;br /&gt;
We share the importance of being able to connect with yourself, with your emotions and how powerful meditation is to help this.&lt;br /&gt;
 &lt;br /&gt;
We share diverse experiences of stress, care, lack of care and impacts on the bodies of activists.&lt;br /&gt;
  &lt;br /&gt;
'''Closing:'''&lt;br /&gt;
     &lt;br /&gt;
We close the session with an exercise of collective containment, hugging and &amp;quot;mesándonos&amp;quot; (needs explanation) in circle.&lt;br /&gt;
|Number of facilitators involved=1 or 2&lt;br /&gt;
|Other requirements=Comfortable and relaxing space, Computer and small audio system&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Faraday_Phone_Pouch&amp;diff=8975</id>
		<title>Faraday Phone Pouch</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Faraday_Phone_Pouch&amp;diff=8975"/>
				<updated>2017-03-16T16:17:11Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== The electromagnetic spectrum ==&lt;br /&gt;
The electromagnetic spectrum or electric radio spectrum is not something material, but the space that is in the air that goes from the ground to the highest part of the sky. In this space, bands frequencies through which airplanes, wi-fi, bluetooth, walkie talkies, radios, telephones communicate are organized. The fact that our phones can be 2G, 3G, 4G means that they are using different bands of the electromagnetic space, through which the information circulates.&lt;br /&gt;
&lt;br /&gt;
For more information about the electromagnetic space:&lt;br /&gt;
https://imagine.gsfc.nasa.gov/science/toolbox/emspectrum1.html&lt;br /&gt;
https://en.wikipedia.org/wiki/Electromagnetic_spectrum&lt;br /&gt;
&lt;br /&gt;
== Faraday Cage == &lt;br /&gt;
&lt;br /&gt;
[[File:Jauladefaraday.jpg|centre]]&lt;br /&gt;
&lt;br /&gt;
It is known as a cage or box of Faraday the effect by which the electromagnetic field inside a conductor in equilibrium is null, nullifying the effect of the external fields. This is because, when the conductor is subjected to an external electromagnetic field, it is polarized, so that it is positively charged in the direction of the electromagnetic field, and negatively charged in the opposite direction. Since the conductor has been polarized, it generates an electric field equal in magnitude but opposite in the direction of the electromagnetic field, then the sum of both fields inside the conductor will be equal to 0.&lt;br /&gt;
&lt;br /&gt;
It is evident in many everyday situations, for example, the malfunction of mobile phones inside elevators or buildings with steel grid structure. One way to check this is with a radio tuned to a Middle Wave station. When it is surrounded with a newspaper, the sound is heard correctly, but if we replace the paper with aluminum foil, the radio will cease to emit sounds: aluminum is an electric conductor and causes Faraday's cage effect.&lt;br /&gt;
&lt;br /&gt;
This phenomenon, discovered by Michael Faraday in 1836, has an important application in airplanes or in the protection of sensitive electronic equipment, such as hard disks or radio and television repeaters located on mountain peaks and exposed to electromagnetic disturbances caused by storms . It also currently serves to block the reading of RFID (Radio Frequency Identifiers) chips, which store personal information that can be intercepted by anyone with a radio-frequency scanner. These chips are found in objects such as passports, credit cards and some driver's licenses.&lt;br /&gt;
&lt;br /&gt;
The Faraday box allows to block the communication of a device with the outside. In the case of mobile phones, they emit signals constantly, even when they are switched off. GPS, which allows us to locate where we are, no matter if it is off or on, also the phone will be locateable by towers that triangulate the signals. The fact that your phone has no signal (when you can not call), does not imply that you are not locateable, or that you have stopped sending signals.&lt;br /&gt;
&lt;br /&gt;
Some household appliances work as Faraday boxes, for example the freezer in the refrigerator, as having a thick layer of metal can have the same effect, if we introduce the cell phone inside, we prevent signals from being emitted.&lt;br /&gt;
&lt;br /&gt;
About Faraday cage:&lt;br /&gt;
https://en.wikipedia.org/wiki/Faraday_cage&lt;br /&gt;
&lt;br /&gt;
Experiment of creating a Farady cage:&lt;br /&gt;
https://backyardbrains.com/experiments/faraday&lt;br /&gt;
&lt;br /&gt;
== How they can intercept the information on your phone ==&lt;br /&gt;
&lt;br /&gt;
One way to intercept the information on your phone is through an IMSI-catcher, a device that can be installed anywhere (a car, a house nearby, etc.), and which simulates to be the antenna of a telephone operator mobile. When installed, the cell phones of this operator will automatically connect with this fake antenna. Thus, this device locates and identifies the switched phones that are in the sector, even if they are not communicating, registering and sending information that identifies them (such as telephone number and device number).&lt;br /&gt;
&lt;br /&gt;
The IMSI-catcher can also relay the communications out of a particular cell phone in such a way that it can not perceive its presence. This way you can have direct access to the content of these broadcast communications that relays and can serve as a live listening device.&lt;br /&gt;
&lt;br /&gt;
You can read a HowTo on IMSI-catcher:&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Detect_false_mobile_antennas&lt;br /&gt;
&lt;br /&gt;
== Build a Faraday Pouch  ==&lt;br /&gt;
&lt;br /&gt;
[[File:Myphoneisoff.jpg|centre|432x432px]]&lt;br /&gt;
&lt;br /&gt;
There are several ways to make a bag for our mobile devices or tablets so that they are not traceable and do not emit signals through which we can be identified or spied upon.&lt;br /&gt;
&lt;br /&gt;
You have to get the conductive textile first which can be bought online in places like these:&lt;br /&gt;
&lt;br /&gt;
[http://www.yshield.com/ww/yshield-shielding-fleece-hnv80-hf-lf-width-100-cm-1-meter exemple 1]&lt;br /&gt;
&lt;br /&gt;
The most important thing is that when you make the cover there is no open space where the signal can leak. Make sure you sew all the edges, you can fold the textile before sewing it.&lt;br /&gt;
&lt;br /&gt;
[[File:-Tela y proceso de bolsa por killyourphone-com.jpg|514x514px|graphs from killyourphone.com]]&lt;br /&gt;
&lt;br /&gt;
The sheath can be made with a sewing machine or by hand. You can design a way to close it, with a button, with velcro, or simply with a clamp.&lt;br /&gt;
&lt;br /&gt;
If the textile is not very thick or powerful, you can use it twice. You can also, if you want to increase the aesthetics of your pouch, use another textile for the outer coating. You can try different designs and shapes, as shown in the drawing:&lt;br /&gt;
&lt;br /&gt;
[[File:killyourphone-desings-drawings.jpg|539x539px|graphs from killyourphone.com]]&lt;br /&gt;
&lt;br /&gt;
== Additional safety measures for your pouch ==&lt;br /&gt;
&lt;br /&gt;
Using in group the pouch can be a very suspicious technique if, for example, several monitored mobiles, located in the same area, are switched off or no longer connected to the network at the same time. If it is done this way it will make it evident that these people have something to hide or they are into something weird. In that sense, the safest practice is still to leave your phone in the house, or at least, remove the battery or put it in the case before leaving your house to not reveal the meeting place.&lt;br /&gt;
&lt;br /&gt;
Be very careful as the Faraday bag does not cancel the microphone. Although the phone is incommunicado with the outside, could have installed some tool that allows to record and then send said recording. Be sure to keep the phone in an acoustically isolated location. You can put the phone with its case inside an airtight glass jar, in the refrigerator, or in another room.&lt;br /&gt;
&lt;br /&gt;
== Other interesting links ==&lt;br /&gt;
http://killyourphone.com/es/&lt;br /&gt;
&lt;br /&gt;
http://briangreen.net/2010/11/diy-ultralight-faraday-cage-pouch.html&lt;br /&gt;
&lt;br /&gt;
http://www.datenform.de/silvereng.html&lt;br /&gt;
&lt;br /&gt;
http://makezine.com/2010/11/18/phonekerchief-blocks-cell-signals/&lt;br /&gt;
&lt;br /&gt;
http://www.backdoorsurvival.com/how-to-build-a-simple-faraday-cage-for-emp-survival/&lt;br /&gt;
&lt;br /&gt;
Forums of testing Faraday cages and pouches:&lt;br /&gt;
&lt;br /&gt;
http://www.survivalistboards.com/showthread.php?t=156111&lt;br /&gt;
&lt;br /&gt;
http://www.survivalistboards.com/showthread.php?t=231373&lt;br /&gt;
&lt;br /&gt;
http://www.survivalistboards.com/showthread.php?t=301999&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
== The electromagnetic spectrum ==&lt;br /&gt;
The electromagnetic spectrum or electric radio spectrum is not something material, but the air space that goes from the ground to the highest part of the atmosphere. Frequency bands are organized in this space, which airplanes, wi-fi, bluetooth, walkie talkies, radios, and telephones use to communicate, for example 2G, 3G, 4G phone networks all use different bands of the electromagnetic space. &lt;br /&gt;
&lt;br /&gt;
For more information about the electromagnetic space:&lt;br /&gt;
https://imagine.gsfc.nasa.gov/science/toolbox/emspectrum1.html&lt;br /&gt;
https://en.wikipedia.org/wiki/Electromagnetic_spectrum&lt;br /&gt;
&lt;br /&gt;
== Faraday Cage == &lt;br /&gt;
&lt;br /&gt;
[[File:Jauladefaraday.jpg|centre]]&lt;br /&gt;
&lt;br /&gt;
The Faraday cage is a structure or item that blocks all electromagnetic fields from outside it to anything within it, meaning an electronic device that transmits signals  - such as a phone - will  note receive or transmit any signal within it.&lt;br /&gt;
&lt;br /&gt;
The Faraday cage is based on the effect by which the electromagnetic field inside a conductor in equilibrium is null, and nullifies the effect of the external fields. This is because when the conductor is subjected to an external electromagnetic field, it is polarized, meaning it is positively charged in the direction of the electromagnetic field, and negatively charged in the opposite direction. Since the conductor has been polarized, it generates an electric field equal in magnitude but opposite in the direction of the electromagnetic field, so the sum of both fields inside the conductor will be equal to 0.&lt;br /&gt;
&lt;br /&gt;
This effect is evident in many everyday situations, for example, the malfunction of mobile phones inside elevators or buildings with a steel grid structure. One way to check this is with a radio tuned to a Medium Wave radio station. When it is surrounded with a newspaper, the sound is heard correctly, but if we replace the paper with aluminum foil, the radio will cease to emit sounds: aluminum is an electric conductor and causes Faraday's cage effect.&lt;br /&gt;
s&lt;br /&gt;
This phenomenon, discovered by Michael Faraday in 1836, is essential for protecting sensitive electronic equipment, such as hard disks or radio and television repeaters, that are exposed to electromagnetic disturbances caused by storms, for example in exposed mountain-top antennas or in aircraft. This effect is also used to block the reading of RFID (Radio Frequency Identifiers) chips, which store personal information and can be intercepted by anyone with a radio-frequency scanner. These chips are found in objects such as passports, credit cards and some driver's licenses.&lt;br /&gt;
&lt;br /&gt;
Mobile phones emit signals constantly, even when they are switched off, for example GPS signals, which reveal a phone's location no matter if it is off or on, or the network signal that enables a phone to be located using triangulation between phone masts. The fact that your phone has no signal (when you cannot call), does not mean that you are not locatable, or that you have stopped sending signals.&lt;br /&gt;
&lt;br /&gt;
Some household appliances work as Faraday boxes, as a thick layer of metal can have the same effect, for example the freezer in the refrigerator; if a phone is put inside it prevents signals from being emitted.&lt;br /&gt;
&lt;br /&gt;
About the Faraday cage:&lt;br /&gt;
https://en.wikipedia.org/wiki/Faraday_cage&lt;br /&gt;
&lt;br /&gt;
Experiment of creating a Farady cage:&lt;br /&gt;
https://backyardbrains.com/experiments/faraday&lt;br /&gt;
&lt;br /&gt;
== How they can intercept the information on your phone ==&lt;br /&gt;
&lt;br /&gt;
One way to intercept the information on your phone is through an IMSI-catcher, a device that can be installed anywhere (a car, a house nearby, etc.), and which simulates the antenna of a mobile phone mast. When installed, the cell phones for a specified network will automatically connect with this fake antenna. Thus, this device locates and identifies the phones that are in range, even if they are not communicating, registering or sending information that identifies them (such as telephone number and device number).&lt;br /&gt;
&lt;br /&gt;
The IMSI-catcher can also relay the communications from a particular cell phone in such a way that the phone can not detect its presence. In this way an IMSI-catcher can have direct access to the content of from mobile phones and can use a mobile phone as a live listening device.&lt;br /&gt;
&lt;br /&gt;
You can read a How To guide on IMSI-catchers here:&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Detect_false_mobile_antennas&lt;br /&gt;
&lt;br /&gt;
== Build a Faraday Pouch  ==&lt;br /&gt;
&lt;br /&gt;
[[File:Myphoneisoff.jpg|centre|432x432px]]&lt;br /&gt;
&lt;br /&gt;
There are several ways to make a bag for mobile devices or tablets so that they are not traceable and do not emit signals.&lt;br /&gt;
&lt;br /&gt;
You'll need a conductive textile, which can be bought online in places like these:&lt;br /&gt;
&lt;br /&gt;
[http://www.yshield.com/ww/yshield-shielding-fleece-hnv80-hf-lf-width-100-cm-1-meter example 1]&lt;br /&gt;
&lt;br /&gt;
The most important thing is that when you make the cover there is no gap from where the signal can leak. Make sure you sew all the edges, you can fold the textile before sewing it.&lt;br /&gt;
&lt;br /&gt;
[[File:-Tela y proceso de bolsa por killyourphone-com.jpg|514x514px|graphs from killyourphone.com]]&lt;br /&gt;
&lt;br /&gt;
The sleeve can be made with a sewing machine or by hand. You can design a way to close it: with a button, with velcro, or simply with a clamp.&lt;br /&gt;
&lt;br /&gt;
If the textile is not very thick or strong, you can use two layers. If you want to improve the appearance of your pouch, you can use another textile for the outer coating. You can try different designs and shapes, as shown in the drawing:&lt;br /&gt;
&lt;br /&gt;
[[File:killyourphone-desings-drawings.jpg|539x539px|graphs from killyourphone.com]]&lt;br /&gt;
&lt;br /&gt;
== Additional safety measures for your pouch ==&lt;br /&gt;
&lt;br /&gt;
Using Faraday pouches as a group can arouse suspicion. If for example, several monitored mobiles located in the same area, are switched off or no longer connected to the network at the same time, it could make it obvious that those people have something to hide or are doing something unusual. In that situation, the safest practice is still to leave your phone in the house, or at least remove the battery, or put it in the Faraday pouch before leaving your house so as not to reveal the meeting place.&lt;br /&gt;
&lt;br /&gt;
Take extra care regarding sound, as the Faraday bag does not affect the microphone. Although the phone is incommunicado with the outside, a tool could have been installed that allows sound to be recorded and sent somewhere later. Be sure to keep the phone in an sound proof place; you can put the phone with its case inside an airtight glass jar, in the refrigerator, or in another room.&lt;br /&gt;
&lt;br /&gt;
== Other interesting links ==&lt;br /&gt;
http://killyourphone.com/es/&lt;br /&gt;
&lt;br /&gt;
http://briangreen.net/2010/11/diy-ultralight-faraday-cage-pouch.html&lt;br /&gt;
&lt;br /&gt;
http://www.datenform.de/silvereng.html&lt;br /&gt;
&lt;br /&gt;
http://makezine.com/2010/11/18/phonekerchief-blocks-cell-signals/&lt;br /&gt;
&lt;br /&gt;
http://www.backdoorsurvival.com/how-to-build-a-simple-faraday-cage-for-emp-survival/&lt;br /&gt;
&lt;br /&gt;
Forums of testing Faraday cages and pouches:&lt;br /&gt;
&lt;br /&gt;
http://www.survivalistboards.com/showthread.php?t=156111&lt;br /&gt;
&lt;br /&gt;
http://www.survivalistboards.com/showthread.php?t=231373&lt;br /&gt;
&lt;br /&gt;
http://www.survivalistboards.com/showthread.php?t=301999&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Cryptocurrency_(Buying_things_anonymously)&amp;diff=8974</id>
		<title>Cryptocurrency (Buying things anonymously)</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Cryptocurrency_(Buying_things_anonymously)&amp;diff=8974"/>
				<updated>2017-03-16T15:49:18Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:moneda.png|400px|thumb|center|&amp;lt;ref&amp;gt;ASCII de una moneda del siglo VI a. C. 1/3 de Estátera.&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
A cryptomoney is a type of currency that allows economic exchanges, and which is characterized by being stored electronically and incorporates encryption for security of transactions. Intuitively we can think of cryptomoneys as digital coins, however because of the technology they incorporate and their functioning they are not equivalent. Cryptomoney can serve, like conventional currencies, to buy products or pay for services.&lt;br /&gt;
&lt;br /&gt;
There is no consensual definition, wikipedia tell us the following:&lt;br /&gt;
&lt;br /&gt;
A cryptocurrency (or crypto currency) is a digital asset designed to work as a medium of exchange using cryptography to secure the transactions and to control the creation of additional units of the currency. Cryptocurrencies are a subset of alternative currencies, or specifically of digital currencies. Bitcoin became the first decentralized cryptocurrency in 2009. Since then, numerous cryptocurrencies have been created. These are frequently called altcoins, as a blend of bitcoin alternative. Bitcoin and its derivatives use decentralized control  as opposed to centralized electronic money/centralized banking systems. The decentralized control is related to the use of bitcoin's blockchain transaction database in the role of a distributed ledger &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Cryptocurrency&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are different types of criptomoneys but they have in common that their value is determined by the supply and the demand and that in principle they are not falsifiable (even tough this does not prevent always fraud exists, see for example the case of OneCoin&amp;lt;ref&amp;gt;https://steemit.com/money/@morpheustitania/onecoin-is-a-scam&amp;lt;/ref&amp;gt;).&lt;br /&gt;
&lt;br /&gt;
Broadly speaking, we can trace the birth of cryptomonedas as part of the criptopunk movement that appealed to the use of cryptography as a tactic for social change. One of the first electronic coins was Digicash launched in 1990 by David Chaum, this centrally-operated currency already incorporated encryption and allowed electronic transactions&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/DigiCash&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Seven years later Adam Black proposed Hashcash a mining system that uses a proof-of-work algorithm work (POW &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Proof-of-work_system&amp;lt;/ref&amp;gt;) originally used to limit spam (unwanted mail) and denial of service (DoS) attacks and which would be later incorporated into cryptomoenys. In 2009,  an unknown identity under the pseudonym Satoshi Nakamoto published Bitcoin  which is one of the most used cryptomoneys and that we will use to develop this ''How to''. &lt;br /&gt;
&lt;br /&gt;
Bitcoin is characterised by &amp;lt;ref&amp;gt;http://chimera.labs.oreilly.com/books/1234000001802/ch01.html#_what_is_bitcoin&amp;lt;/ref&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; A decentralized p2p network (the bitcoin protocol)&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Transactions are public (the block chain)&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; A decentralized deterministic coin and mathematical emission (distributed mining)&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; A decentralized transaction verification system (transaction script)&lt;br /&gt;
&lt;br /&gt;
Currently it has the following fundamental principles &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Blockchain_%28database%29&amp;lt;/ref&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; 21 million: the number of units will never exceed 21 million bitcoins.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Uncensored: no one can ban or censor valid transactions.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Open source: Bitcoin's source code should always be accessible to everyone.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Without permission: nobody can prevent participation in the network.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Pseudonym: no identification is required to participate in the Bitcoin network.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Fungible: each unit is interchangeable.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Irreversible payments: Confirmed transactions can not be modified or eliminated. The story is unforgettable.&lt;br /&gt;
&lt;br /&gt;
You can watch the following video to see how a mining farm of bitcoins looks like in China&lt;br /&gt;
{{#ev:vimeo|https://vimeo.com/141600878}}&lt;br /&gt;
&lt;br /&gt;
== What do you need?==&lt;br /&gt;
&lt;br /&gt;
A USB with TAILS and a some persistence&lt;br /&gt;
&lt;br /&gt;
== How can I use bitcoins to buy anonymously?==&lt;br /&gt;
&lt;br /&gt;
To be able to make transactions with Bitcoin you need to have an address (with which you can receive or send Bitcoins) and keys, with which your transactions will be signed, the set of keys is known as a Wallet.&lt;br /&gt;
[[File:Wallet_bitcoin.png|400px|thumb|left|Wallets &amp;lt;ref&amp;gt;https://bitcoin.org/en/choose-your-wallet&amp;lt;/ref&amp;gt;]] &lt;br /&gt;
&lt;br /&gt;
Bitcoin currently has a large number of wallets that can work as programs, mobile applications and even as devices.&lt;br /&gt;
&lt;br /&gt;
Although Bitcoin incorporates encryption in order to achieve anonymity in purchases, it requires that transactions can not be associated with your legal identity. This is not so simple, you can see more information at: https://en.bitcoin.it/wiki/Anonymity. In our case we will use the wallet that comes in TAILS by default: Electrum &amp;lt;ref&amp;gt;https://electrum.org/#home&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
=== Five steps to create a wallet in TAILS===&lt;br /&gt;
&lt;br /&gt;
 1) In Applications go to Internet and open Electrum Wallet Bitcoin&lt;br /&gt;
[[File:electrum1.png|400px|thumb|center|Electrum]] &lt;br /&gt;
&lt;br /&gt;
2) Follow the process by selecting the option to create a new wallet standard&lt;br /&gt;
[[File:electrum2.png|400px|thumb|center|Creando tu cuenta.]]&lt;br /&gt;
&lt;br /&gt;
3) The wallet creation program generates 13 words and suggests you copy them on paper or use a QRT code. You can choose the one you prefer but for the QRT code you will also need a program that reads this type of code.&lt;br /&gt;
[[File:electrum3.png|400px|thumb|center|]]&lt;br /&gt;
&lt;br /&gt;
4) You will be prompted for a password (use a strong one and do not forget it)&lt;br /&gt;
[[File:electrum4.png|400px|thumb|center|]]&lt;br /&gt;
&lt;br /&gt;
5) The program will ask you if it connects itself or if you prefer to do it manually, you can select the option that better suits you.&lt;br /&gt;
[[File:electrum5.png|400px|thumb|center|]]&lt;br /&gt;
&lt;br /&gt;
6) Your wallet has been created. You now have an address to 'receive' deposits and you can make transactions with others by sending them Bitcoins if you know the shipping addresses.&lt;br /&gt;
[[File:electrum6.png|400px|thumb|left|Adress to receive Bitcoins]]&lt;br /&gt;
[[File:electrum7.png|400px|thumb|none|Sending Bitcoins]]&lt;br /&gt;
&lt;br /&gt;
 ===Adding Bitcoins to your wallet===&lt;br /&gt;
&lt;br /&gt;
There are different ways to get your wallet to receive bitcoins, in our case to do it anonymously we suggest to find some intermediary organization that is dedicated to the transfer of bitcoins and that allows you to make a deposit in a bank that has ATMs that will not force you to associate the deposit with a personal legal identity (eg &amp;lt;ref&amp;gt; https://www.bitboat.net/en/help&amp;lt;/ ref&amp;gt;) This type of organization will act as an intermediary and it will provide you with a deposit account that will enable you to get the bitcoins to your wallet. Another way is through an intermediary organization that enable instant deposits like MoneyPolo&amp;lt;ref&amp;gt;https://moneypolo.com&amp;lt;/ref&amp;gt; . &lt;br /&gt;
&lt;br /&gt;
===Buying===&lt;br /&gt;
As in other types of electronic transactions, what you need is to be told where to send the bitcoins (shipping address) and places where you accept this type of currency, for example it is possible to pay with bitcoins domains, electronic products, services, medicines, you can have some ideas in: https://en.wikipedia.org/wiki/OpenBazaar.&lt;br /&gt;
&lt;br /&gt;
===Final notes===&lt;br /&gt;
Remember that all transactions are public so to avoid addresses being associated with purchases you can make deposits of smaller quantities of bitcoins and transfer equally smaller amounts.&lt;br /&gt;
&lt;br /&gt;
You should also remember that ATMs have cameras and that now it is becoming easier to use  face recognition through images.&lt;br /&gt;
&lt;br /&gt;
Finally, there are countries where it is illegal to use Bitcoins &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Legality_of_bitcoin_by_country&amp;lt;/ref&amp;gt; . &lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:moneda.png|400px|thumb|center|&amp;lt;ref&amp;gt;ASCII de una moneda del siglo VI a. C. 1/3 de Estátera.&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
A cryptocurrency is a type of currency that is stored electronically and incorporates encryption for security of transactions. Cryptocurrency can be used, like conventional currencies, to buy products or pay for services. Intuitively, we can think of cryptocurrencies as digital coins, however, because of the technology they incorporate and the way they work they are not the same.&lt;br /&gt;
&lt;br /&gt;
There is no single universally accepted definition for cryptocurrencies, but Wikipedia states:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;A cryptocurrency (or crypto currency) is a digital asset designed to work as a medium of exchange using cryptography to secure the transactions and to control the creation of additional units of the currency. Cryptocurrencies are a subset of alternative currencies, or specifically of digital currencies. Bitcoin became the first decentralized cryptocurrency in 2009. Since then, numerous cryptocurrencies have been created. These are frequently called altcoins, as a blend of bitcoin alternative. Bitcoin and its derivatives use decentralized control  as opposed to centralized electronic money/centralized banking systems. The decentralized control is related to the use of bitcoin's blockchain transaction database in the role of a distributed ledger &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Cryptocurrency&amp;lt;/ref&amp;gt;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
There are many different types of cryptocurrencies, but all of them have a value determined by supply and demand and are impossible, in principle at least, to falsify (even though this does not prevent all fraud, see for example the case of OneCoin&amp;lt;ref&amp;gt;https://steemit.com/money/@morpheustitania/onecoin-is-a-scam&amp;lt;/ref&amp;gt;).&lt;br /&gt;
&lt;br /&gt;
Broadly speaking, we can trace the birth of cryptocurrencies to the criptopunk movement that advocated the use of cryptography as a tactic for social change. One of the first electronic coins was Digicash, launched in 1990 by David Chaum. This centrally-operated currency already incorporated encryption and allowed electronic transactions&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/DigiCash&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Seven years later Adam Black proposed Hashcash, a mining system that used a proof-of-work algorithm (POW &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Proof-of-work_system&amp;lt;/ref&amp;gt;) to limit spam (unwanted mail) and denial of service (DoS) attacks, and would later be incorporated into other cyptocurrencies. In 2009  an unknown individual using the pseudonym Satoshi Nakamoto published Bitcoin, one of the most used cryptocurrencies and the main focus of  this ''How to' guide'. &lt;br /&gt;
&lt;br /&gt;
Bitcoin is characterised by &amp;lt;ref&amp;gt;http://chimera.labs.oreilly.com/books/1234000001802/ch01.html#_what_is_bitcoin&amp;lt;/ref&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; A decentralized p2p network (the bitcoin protocol)&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Public transactions (the block chain)&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; A decentralized &amp;quot;deterministic&amp;quot; coin and mathematical production (distributed mining)&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; A decentralized transaction verification system (transaction script)&lt;br /&gt;
&lt;br /&gt;
Currently it has the following fundamental principles &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Blockchain_%28database%29&amp;lt;/ref&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Absolute limit on currency production: the number of units will never exceed 21 million bitcoins.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; It is uncensored: no one can ban or censor valid transactions.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; It is open source: Bitcoin's source code should always be accessible to everyone.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; No permission is required: nobody can prevent participation in the network.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; It is anonymous : no identification is required to participate in the Bitcoin network.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt;It is fungible: each unit is interchangeable.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Payments are irreversible: Confirmed transactions can not be modified or reversed. The story is unforgettable.&lt;br /&gt;
&lt;br /&gt;
You can watch the following video to see how a mining farm of bitcoins looks like in China&lt;br /&gt;
{{#ev:vimeo|https://vimeo.com/141600878}}&lt;br /&gt;
&lt;br /&gt;
== What do you need?==&lt;br /&gt;
&lt;br /&gt;
A TAILS USB with persistence&lt;br /&gt;
&lt;br /&gt;
== How can I use bitcoins to buy anonymously?==&lt;br /&gt;
&lt;br /&gt;
To be able to make transactions with Bitcoin you need to have an address (with which you can receive or send Bitcoins) and keys, with which your transactions will be signed. This set of keys is known as a Wallet.&lt;br /&gt;
[[File:Wallet_bitcoin.png|400px|thumb|left|Wallets &amp;lt;ref&amp;gt;https://bitcoin.org/en/choose-your-wallet&amp;lt;/ref&amp;gt;]] &lt;br /&gt;
&lt;br /&gt;
Bitcoin currently has a large number of wallets that can work as programs, mobile applications and even as devices.&lt;br /&gt;
&lt;br /&gt;
Although Bitcoin incorporates encryption in order to achieve anonymity in purchases, it requires that transactions can not be associated with your legal identity. This is not so simple, you can see more information at: https://en.bitcoin.it/wiki/Anonymity. For this guide we will use the wallet that comes in TAILS by default: Electrum &amp;lt;ref&amp;gt;https://electrum.org/#home&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
=== Five steps to create a wallet in TAILS===&lt;br /&gt;
&lt;br /&gt;
 1) In Applications go to Internet and open Electrum Wallet Bitcoin&lt;br /&gt;
[[File:electrum1.png|400px|thumb|center|Electrum]] &lt;br /&gt;
&lt;br /&gt;
2) Follow the process by selecting the option to create a new wallet standard&lt;br /&gt;
[[File:electrum2.png|400px|thumb|center|Creando tu cuenta.]]&lt;br /&gt;
&lt;br /&gt;
3) The wallet creation program generates 13 words and suggests you copy them on paper or use a QRT code. You can choose the one you prefer but for the QRT code you will also need a program that reads this type of code.&lt;br /&gt;
[[File:electrum3.png|400px|thumb|center|]]&lt;br /&gt;
&lt;br /&gt;
4) You will be prompted for a password (use a strong one and do not forget it)&lt;br /&gt;
[[File:electrum4.png|400px|thumb|center|]]&lt;br /&gt;
&lt;br /&gt;
5) The program will ask you if it connects itself or if you prefer to do it manually, you can select the option that better suits you.&lt;br /&gt;
[[File:electrum5.png|400px|thumb|center|]]&lt;br /&gt;
&lt;br /&gt;
6) Your wallet has been created. You now have an address to 'receive' deposits and you can make transactions with others by sending them Bitcoins if you know their shipping addresses.&lt;br /&gt;
[[File:electrum6.png|400px|thumb|left|Adress to receive Bitcoins]]&lt;br /&gt;
[[File:electrum7.png|400px|thumb|none|Sending Bitcoins]]&lt;br /&gt;
&lt;br /&gt;
 ===Adding Bitcoins to your wallet===&lt;br /&gt;
&lt;br /&gt;
There are different ways to  to receive bitcoins in your wallet. To buy Bitcoins anonymously you need to find an intermediary organization that trades bitcoins and that will accept an anonymous bank ATM deposit (you'll need to find a bank that offers this service -eg &amp;lt;ref&amp;gt; https://www.bitboat.net/en/help&amp;lt;/ ref&amp;gt;). Once you have made your deposit the intermediary organization will transfer the bitcoins to your wallet. Another way is through an intermediary organization that offers instant deposits like MoneyPolo&amp;lt;ref&amp;gt;https://moneypolo.com&amp;lt;/ref&amp;gt; . &lt;br /&gt;
&lt;br /&gt;
===Buying===&lt;br /&gt;
As in other types of electronic transactions, to buy something, you need to find services that accept bitcoins, for example sellers of  domains, electronic products, services, medicines, and then you need to know where to send the bitcoins, i.e. a shipping address: https://en.wikipedia.org/wiki/OpenBazaar.&lt;br /&gt;
&lt;br /&gt;
===Final notes===&lt;br /&gt;
Remember that all transactions are public so, to avoid addresses being associated with purchases, you can make deposits of small quantities of bitcoins and transfer equally small amounts.&lt;br /&gt;
&lt;br /&gt;
You should also remember that ATMs have cameras and that effective facial recognition is increasingly widely used.&lt;br /&gt;
&lt;br /&gt;
Finally, there are countries where it is illegal to use Bitcoins &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Legality_of_bitcoin_by_country&amp;lt;/ref&amp;gt; . &lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Deep_web&amp;diff=8973</id>
		<title>Deep web</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Deep_web&amp;diff=8973"/>
				<updated>2017-03-16T15:35:56Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== What is the deep web??==&lt;br /&gt;
&lt;br /&gt;
The deep web refers to all the information that is in the world wide we but is not indexed so it is not possible to access it using search engines like Google &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Deep_web&amp;lt;/ref&amp;gt;. Web indexing (or Internet indexing) refers to various methods for indexing the contents of a website or of the Internet as a whole. Individual websites or intranets may use a back-of-the-book index, while search engines usually use keywords and metadata to provide a more useful vocabulary for Internet or onsite searching. With the increase in the number of periodicals that have articles online, web indexing is also becoming important for periodical websites  &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Web_indexing&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:deep_web.png|400px|center|alt=Web profunda]]&lt;br /&gt;
&lt;br /&gt;
According to the wikipedia &amp;quot;The portion of the web that is indexed by standard search engines is known as the surface web. As of 2001, the deep web was several orders of magnitude larger than the surface web. An analogy of an iceberg used by Denis Shestakov represents the division between surface web and deep web respectively: It is impossible to measure, and harsh to put estimates on, the size of the deep web because the majority of the information is hidden or locked inside databases. Early estimates suggested that the deep web is 400 to 550 times larger than the surface web. However, since more information and sites are always being added, it can be assumed that the deep web is growing exponentially at a rate that cannot be quantified.”&lt;br /&gt;
&lt;br /&gt;
A common confusions is to mix up the deep web and the dark web. Latter corresponds to a part of the deep web, which besides not being indexed has been hidden using methods such as masking IP and/or requiring special permissions or the use of specific software to access it &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Dark_web&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
But if it is not indexed, how do we access it? Below we describe two ways you can immerse yourself in the deep web.&lt;br /&gt;
&lt;br /&gt;
== Navigating the deep web using Tor==&lt;br /&gt;
&lt;br /&gt;
[[File:Tor-logo-2011-flat.svg|120px|left|alt=TOR]]&lt;br /&gt;
&lt;br /&gt;
One of the easiest ways is to use the  hidden service protocol TOR &amp;lt;ref&amp;gt;https://www.torproject.org/docs/hidden-services.html.en&amp;lt;/ref&amp;gt; that operates within the anonymous distributed network of TOR &amp;lt;ref&amp;gt;https://www.torproject.org/about/overview.html.en#thesolution&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
Considering the wide variety of users and type of information that you can find inside the deep web, it is initially easier and safer to access it using the  '''TOR browser''' &amp;lt;Ref&amp;gt; https://www.torproject.org/projects/torbrowser.html.en &amp;lt;/ ref&amp;gt; that is available for various operating systems. Alternatively to maximize your security we recommend the use of '''TAILS''' &amp;lt;ref&amp;gt;https://tails.boum.org/&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Maybe you can ask yourself  if it is not indexed where to start?&lt;br /&gt;
&lt;br /&gt;
===Case A===&lt;br /&gt;
You get an .onion address. Those are “.onion is a special-use top level domain suffix designating an anonymous hidden service reachable via the Tor network. Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed, Internet programs such as web browsers can access sites with .onion addresses by sending the request through the network of Tor servers. The purpose of using such a system is to make both the information provider and the person accessing the information more difficult to trace, whether by one another, by an intermediate network host, or by an outsider  &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/.onion&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
For instance, you receive:&lt;br /&gt;
 http://duskgytldkxiuqc6.onion&lt;br /&gt;
you need to change the  .onion for something like:&lt;br /&gt;
&lt;br /&gt;
.onion.to&lt;br /&gt;
&lt;br /&gt;
.onion.city&lt;br /&gt;
&lt;br /&gt;
.onion.cab&lt;br /&gt;
&lt;br /&gt;
or any other domain made available by the network of volunteers of TOR2web  &amp;lt;ref&amp;gt;https://tor2web.org/&amp;lt;/ref&amp;gt;.  &lt;br /&gt;
&lt;br /&gt;
and you need to open it up in the browser '''TOR'''.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
Deep_web2.png|Opening duskgytldkxiuqc6.onion in a common browser&lt;br /&gt;
Deep_web3.png|Opening duskgytldkxiuqc6.onion.to with TOR browser&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Case B===&lt;br /&gt;
&lt;br /&gt;
You want to look for a page.&lt;br /&gt;
&lt;br /&gt;
You can begin in:&lt;br /&gt;
http://deepweb.pw/&lt;br /&gt;
&lt;br /&gt;
This page could be opened in any browser but only using '''TOR''' browser you will be able to access  .onion pages. &lt;br /&gt;
&lt;br /&gt;
There you can find interesting sites like the Hidden wiki.&lt;br /&gt;
&lt;br /&gt;
You can also look for information here:&lt;br /&gt;
 https://ahmia.fi/search/&lt;br /&gt;
&lt;br /&gt;
Or if you are interested in websites about leaks:&lt;br /&gt;
 https://en.wikipedia.org/wiki/GlobaLeaks#Implementations&lt;br /&gt;
&lt;br /&gt;
Other possible search places:&lt;br /&gt;
 http://3g2upl4pq6kufc4m.onion/&lt;br /&gt;
&lt;br /&gt;
 https://www.reddit.com//r/onions&lt;br /&gt;
&lt;br /&gt;
You should consider that the availability of information in many cases is temporary, so you will need to spend considerable time to get used to the deep web and search more fruitfully. Also the language can be a limitation and before entering forums remember that they generally use specific jargon&amp;lt;ref&amp;gt;http://domekit.cc/survival-kit-in-the-deep-web/&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
===Case C===&lt;br /&gt;
You can also use the hidden services of Riseup&lt;br /&gt;
 https://help.riseup.net/en/tor&lt;br /&gt;
&lt;br /&gt;
==Adding data to the deep web==&lt;br /&gt;
&lt;br /&gt;
Well now you surf the web deep but how do you add information?&lt;br /&gt;
&lt;br /&gt;
If you need to add a file you can use the services '' Share '' of Riseup that let you upload a file up to 50mb for no more than a week. You can find the .onion.to league at:  https://help.riseup.net/en/tor&lt;br /&gt;
&lt;br /&gt;
[[File:Deep_web4.png|400px|center|alt= Riseup Services]]&lt;br /&gt;
&lt;br /&gt;
The second option is using zeronet.io. This tool allows you to publish open, free and uncensored blogs and it uses the Bitcoin cryptography and the BitTorrent network.&lt;br /&gt;
&lt;br /&gt;
Although you can use this tool in different operating systems the option we recommend is '''zeronet + TAILS'''  (https://tails.boum.org/) because it represents the safest form, however it requires that you dedicate a little more time to its configuration since you must know how to enable ports in the internet modem.&lt;br /&gt;
&lt;br /&gt;
[[File:zeronet_logo.png|120px|none|alt=zeronet.io|ZeroNet]] &lt;br /&gt;
&lt;br /&gt;
What do you need?&lt;br /&gt;
&lt;br /&gt;
One USB with TAILS and persistencia activated.&lt;br /&gt;
&lt;br /&gt;
Enable the port  15441 of your modem&lt;br /&gt;
&lt;br /&gt;
1) You have login to a TAILS session using persistence and advanced settings to access the ''root'' terminal.&lt;br /&gt;
&lt;br /&gt;
2) In the terminal you need to write the following commands:&lt;br /&gt;
&lt;br /&gt;
To update and install the required dependencies:&lt;br /&gt;
&lt;br /&gt;
 $ sudo apt-get update&lt;br /&gt;
 $ sudo apt-get upgrade&lt;br /&gt;
 $ sudo apt-get install python-msgpack python-gevent&lt;br /&gt;
&lt;br /&gt;
For downloading zeronet:&lt;br /&gt;
&lt;br /&gt;
 $ wget https://github.com/HelloZeroNet/ZeroNet/archive/master.tar.gz&lt;br /&gt;
&lt;br /&gt;
To unzip the downloaded file:&lt;br /&gt;
&lt;br /&gt;
 $ tar xvpfz master.tar.gz&lt;br /&gt;
&lt;br /&gt;
To enter the file:&lt;br /&gt;
&lt;br /&gt;
 $ cd ZeroNet-master&lt;br /&gt;
&lt;br /&gt;
For starting:&lt;br /&gt;
&lt;br /&gt;
 $ python zeronet.py&lt;br /&gt;
&lt;br /&gt;
If this option does not work you need to check your IP&lt;br /&gt;
&lt;br /&gt;
 $ sudo ifconfig&lt;br /&gt;
&lt;br /&gt;
This command will tell you what your internet address (inet addr), for example in the image it is 10.14.241.166&lt;br /&gt;
[[File:ifconfig.png|400px|center|alt=Comando ifconfig]] &lt;br /&gt;
&lt;br /&gt;
 $ python zeronet.py --proxy 127.0.0.1:9050 --tor disable --ui_ip inet_addr&lt;br /&gt;
In the previous command you must replace inet_addr with the one that corresponds to your computer&lt;br /&gt;
&lt;br /&gt;
With those steps you will have started the services of zeronet&lt;br /&gt;
&lt;br /&gt;
3) In the browser '''TOR''' you need to open the ptions of '''Configuration''' and select ''Advanced'' where you will find the tab  '''Network''' and in the first point you need to go to '''Connection'''  '''Options''' and add in '''No proxi''' 127.0.0.1 or your own inet_addr&lt;br /&gt;
&lt;br /&gt;
[[File:Proxy_conf_tor.png|400px|center|alt=Configuration options for the TOR browser]]&lt;br /&gt;
&lt;br /&gt;
After you can open/&lt;br /&gt;
 http://inet_addr:43110/&lt;br /&gt;
for instance:&lt;br /&gt;
 http://127.0.0.1:43110&lt;br /&gt;
&lt;br /&gt;
And you will find the graphical interface&lt;br /&gt;
&lt;br /&gt;
[[File:zeronet.png|400px]]&lt;br /&gt;
&lt;br /&gt;
To create a new blog you only need to activate '''Zero blog''' and use the tool for cloning.&lt;br /&gt;
[[File:Zeronet2.png|400px]] &lt;br /&gt;
&lt;br /&gt;
'''Note:'''&lt;br /&gt;
&lt;br /&gt;
You will only be able to upload information to the network zeronet if your port 15441 is enabled&lt;br /&gt;
You can see more information about set up and configuration here [https://github.com/HelloZeroNet/ZeroNet ZeroNet]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== What is the deep web??==&lt;br /&gt;
&lt;br /&gt;
The deep web refers to all the information that is in the world wide web but is not indexed, so it is not possible to access it using search engines such as Google &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Deep_web&amp;lt;/ref&amp;gt;. Web indexing (or Internet indexing) refers to various methods for indexing the contents of a website or of the entire Internet. Individual websites or intranets may use a &amp;quot;back-of-the-book&amp;quot; index, while search engines usually use keywords and metadata to provide a more useful vocabulary for Internet or on-site searching. With the increase in the number of periodicals that have articles online, web indexing is also becoming important for periodical websites  &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Web_indexing&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:deep_web.png|400px|center|alt=Web profunda]]&lt;br /&gt;
&lt;br /&gt;
According to Wikipedia, &amp;quot;The portion of the web that is indexed by standard search engines is known as the surface web. As of 2001, the deep web was several orders of magnitude larger than the surface web. An analogy of an iceberg used by Denis Shestakov represents the division between surface web and deep web respectively: It is impossible to measure, and harsh to put estimates on, the size of the deep web because the majority of the information is hidden or locked inside databases. Early estimates suggested that the deep web is 400 to 550 times larger than the surface web. However, since more information and sites are always being added, it can be assumed that the deep web is growing exponentially at a rate that cannot be quantified.”&lt;br /&gt;
&lt;br /&gt;
A common confusions is to mix up the deep web and the dark web; the latter corresponds to a part of the deep web, which besides not being indexed, has been hidden using methods such as masking the IP address and/or requiring special permissions or the use of specific software to access it &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Dark_web&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
But if it is not indexed, how do we access it? Below we describe two ways you can immerse yourself in the deep web.&lt;br /&gt;
&lt;br /&gt;
== Navigating the deep web using Tor==&lt;br /&gt;
&lt;br /&gt;
[[File:Tor-logo-2011-flat.svg|120px|left|alt=TOR]]&lt;br /&gt;
&lt;br /&gt;
One of the easiest ways is to use the  hidden service protocol TOR &amp;lt;ref&amp;gt;https://www.torproject.org/docs/hidden-services.html.en&amp;lt;/ref&amp;gt; that operates within the anonymous distributed TOR network &amp;lt;ref&amp;gt;https://www.torproject.org/about/overview.html.en#thesolution&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
Considering the wide variety of users and type of information that you can find inside the deep web, using the  '''TOR browser''' is normally the easiest and safest method &amp;lt;Ref&amp;gt; https://www.torproject.org/projects/torbrowser.html.en &amp;lt;/ ref&amp;gt;, and is available for various operating systems. Alternatively, for optimum security we recommend '''TAILS''' &amp;lt;ref&amp;gt;https://tails.boum.org/&amp;lt;/ref&amp;gt;, which is a highly secure version of Linux you boot on your computer from a USB stick or other external device..&lt;br /&gt;
&lt;br /&gt;
But if it is not indexed where do you start?&lt;br /&gt;
&lt;br /&gt;
===Case A===&lt;br /&gt;
You get a .onion address. “.onion&amp;quot; is a special-use top level domain suffix designating an anonymous hidden service only reachable via the Tor network. These addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed, Internet programs such as web browsers can access sites with .onion addresses by sending the request through the network of Tor servers. The purpose of using such a system is to make both the information provider and the person accessing the information more difficult to trace, whether by one another, by an intermediate network host, or by an outsider  &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/.onion&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
For instance, you receive:&lt;br /&gt;
 http://duskgytldkxiuqc6.onion&lt;br /&gt;
you need to change the  .onion for something like:&lt;br /&gt;
&lt;br /&gt;
.onion.to&lt;br /&gt;
&lt;br /&gt;
.onion.city&lt;br /&gt;
&lt;br /&gt;
.onion.cab&lt;br /&gt;
&lt;br /&gt;
or any other domain made available by the network of volunteers of TOR2web  &amp;lt;ref&amp;gt;https://tor2web.org/&amp;lt;/ref&amp;gt;.  &lt;br /&gt;
&lt;br /&gt;
and you need to open it up in the browser '''TOR'''.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
Deep_web2.png|Opening duskgytldkxiuqc6.onion in a common browser&lt;br /&gt;
Deep_web3.png|Opening duskgytldkxiuqc6.onion.to with TOR browser&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Case B===&lt;br /&gt;
&lt;br /&gt;
You want to look for a page.&lt;br /&gt;
&lt;br /&gt;
You can begin with:&lt;br /&gt;
http://deepweb.pw/&lt;br /&gt;
&lt;br /&gt;
This page can be opened in any browser, but you can only access .onion pages using the '''TOR''' browser. &lt;br /&gt;
&lt;br /&gt;
Here you can find interesting sites like the Hidden wiki.&lt;br /&gt;
&lt;br /&gt;
You can also look for information here:&lt;br /&gt;
 https://ahmia.fi/search/&lt;br /&gt;
&lt;br /&gt;
Or if you are interested in websites about leaks:&lt;br /&gt;
 https://en.wikipedia.org/wiki/GlobaLeaks#Implementations&lt;br /&gt;
&lt;br /&gt;
Other possible search places:&lt;br /&gt;
 http://3g2upl4pq6kufc4m.onion/&lt;br /&gt;
&lt;br /&gt;
 https://www.reddit.com//r/onions&lt;br /&gt;
&lt;br /&gt;
You should consider that the availability of information in many cases is temporary, so you will need to spend some time to getting used to the deep web so you search more fruitfully. Also,  language can be a limitation; before entering forums remember that they generally use specific jargon&amp;lt;ref&amp;gt;http://domekit.cc/survival-kit-in-the-deep-web/&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
===Case C===&lt;br /&gt;
You can also use the hidden services of Riseup&lt;br /&gt;
 https://help.riseup.net/en/tor&lt;br /&gt;
&lt;br /&gt;
==Adding data to the deep web==&lt;br /&gt;
&lt;br /&gt;
Now you can surf the deep web, but how do you add information?&lt;br /&gt;
&lt;br /&gt;
If you need to add a file you can use the Riseup '' Share '' service that lets you upload a file of up to 50mb for no more than a week. You can find the .onion.to league at:  https://help.riseup.net/en/tor&lt;br /&gt;
&lt;br /&gt;
[[File:Deep_web4.png|400px|center|alt= Riseup Services]]&lt;br /&gt;
&lt;br /&gt;
The second option is using zeronet.io. This tool allows you to publish open, free and uncensored blogs and it uses Bitcoin cryptography and the BitTorrent network.&lt;br /&gt;
&lt;br /&gt;
Although you can use this tool with different operating systems, the option we recommend is '''zeronet + TAILS'''  (https://tails.boum.org/) as the safest method. However, with this approach you need to dedicate a little more time to its configuration since you must know how to enable ports on an internet modem.&lt;br /&gt;
&lt;br /&gt;
[[File:zeronet_logo.png|120px|none|alt=zeronet.io|ZeroNet]] &lt;br /&gt;
&lt;br /&gt;
What do you need?&lt;br /&gt;
&lt;br /&gt;
One TAILS USB with persistence activated.&lt;br /&gt;
&lt;br /&gt;
Enable the port  15441 of your modem&lt;br /&gt;
&lt;br /&gt;
1) Login to a TAILS session using persistence and advanced settings to access the ''root'' terminal.&lt;br /&gt;
&lt;br /&gt;
2) In the terminal you need to write the following commands:&lt;br /&gt;
&lt;br /&gt;
- To update and install the required applications:&lt;br /&gt;
&lt;br /&gt;
 $ sudo apt-get update&lt;br /&gt;
 $ sudo apt-get upgrade&lt;br /&gt;
 $ sudo apt-get install python-msgpack python-gevent&lt;br /&gt;
&lt;br /&gt;
For downloading zeronet:&lt;br /&gt;
&lt;br /&gt;
 $ wget https://github.com/HelloZeroNet/ZeroNet/archive/master.tar.gz&lt;br /&gt;
&lt;br /&gt;
To unzip the downloaded file:&lt;br /&gt;
&lt;br /&gt;
 $ tar xvpfz master.tar.gz&lt;br /&gt;
&lt;br /&gt;
To enter the file:&lt;br /&gt;
&lt;br /&gt;
 $ cd ZeroNet-master&lt;br /&gt;
&lt;br /&gt;
For starting:&lt;br /&gt;
&lt;br /&gt;
 $ python zeronet.py&lt;br /&gt;
&lt;br /&gt;
If this option does not work you need to check your IP&lt;br /&gt;
&lt;br /&gt;
 $ sudo ifconfig&lt;br /&gt;
&lt;br /&gt;
This command will tell you your internet address (inet addr), for example in the image it is 10.14.241.166&lt;br /&gt;
[[File:ifconfig.png|400px|center|alt=Comando ifconfig]] &lt;br /&gt;
&lt;br /&gt;
 $ python zeronet.py --proxy 127.0.0.1:9050 --tor disable --ui_ip inet_addr&lt;br /&gt;
In the previous command you must replace inet_addr with the one that corresponds to your computer&lt;br /&gt;
&lt;br /&gt;
You should now have successfully started Zeronet&lt;br /&gt;
&lt;br /&gt;
3) In the browser '''TOR''' you need to open the options of '''Configuration''' and select ''Advanced'' where you will find the tab  '''Network''' and in the first point you need to go to '''Connection'''  '''Options''' and add in '''No proxi''' 127.0.0.1 or your own inet_addr&lt;br /&gt;
&lt;br /&gt;
[[File:Proxy_conf_tor.png|400px|center|alt=Configuration options for the TOR browser]]&lt;br /&gt;
&lt;br /&gt;
After you can open/&lt;br /&gt;
 http://inet_addr:43110/&lt;br /&gt;
for instance:&lt;br /&gt;
 http://127.0.0.1:43110&lt;br /&gt;
&lt;br /&gt;
And you will find the graphical interface&lt;br /&gt;
&lt;br /&gt;
[[File:zeronet.png|400px]]&lt;br /&gt;
&lt;br /&gt;
To create a new blog you only need to activate '''Zero blog''' and use the tool for cloning.&lt;br /&gt;
[[File:Zeronet2.png|400px]] &lt;br /&gt;
&lt;br /&gt;
'''Note:'''&lt;br /&gt;
&lt;br /&gt;
You will only be able to upload information to the network zeronet if your port 15441 is enabled&lt;br /&gt;
You can see more information about set up and configuration here [https://github.com/HelloZeroNet/ZeroNet ZeroNet]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Detect_false_mobile_antennas&amp;diff=8972</id>
		<title>Detect false mobile antennas</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Detect_false_mobile_antennas&amp;diff=8972"/>
				<updated>2017-03-16T15:10:47Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== The electromagnetic spectrum ==&lt;br /&gt;
The electromagnetic spectrum or electric radio spectrum is not something material, but the space that is in the air that goes from the ground to the highest part of the sky. In this space, bands frequencies through which airplanes, wi-fi, bluetooth, walkie talkies, radios, telephones communicate are organized. The fact that our phones can be 2G, 3G, 4G means that they are using different bands of the electromagnetic space, through which the information circulates.&lt;br /&gt;
&lt;br /&gt;
For more information about the electromagnetic space:&lt;br /&gt;
https://imagine.gsfc.nasa.gov/science/toolbox/emspectrum1.html&lt;br /&gt;
https://en.wikipedia.org/wiki/Electromagnetic_spectrum&lt;br /&gt;
&lt;br /&gt;
== What is a fake cell tower?==&lt;br /&gt;
Fake cell towers (also known as IMSI catcher) are devices designed to intercept the traffic of a mobile phone and track the movements of the user's phone &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IMSI-catcher &amp;lt;/ref&amp;gt; pretending to be a &amp;quot;legitimate&amp;quot; cell tower &amp;lt;ref&amp;gt;https://www.eff.org/sls/tech/cell-site-simulators &amp;lt;/ref&amp;gt;.&lt;br /&gt;
[[File:Imsi-catcher.png|thumb|none|alt=Esquema torre falsa.|Esquema de una torre falsa de celular (modificado de [http://cybernc.com/les-imsi-catchers/ Henri-Olivier]).]]&lt;br /&gt;
&lt;br /&gt;
By the way they work IMSI catcher are considered a &amp;quot;man in the middle&amp;quot; attack &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Man-in-the-middle_attack&amp;lt;/ref&amp;gt;. This is defined as an attack that acquires the ability to read, insert and modify at will, messages between two parties without any of them knowing that the link between them has been violated. The attacker should be able to observe and intercept messages between the two victims &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IntermediateAccess &amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There is evidence that such devices have been used for surveillance purposes, for example in Ukraine the mobile phones of those attending a large demonstration were tracked and then massively received a text message stating &amp;quot;Dear subscriber, you have been registered As a participant in a mass disturbance &amp;quot;&amp;lt;ref&amp;gt;https://antivigilancia.org/es/2015/06/la-vigilancia-y-la-protesta-social/ &amp;lt;/ref&amp;gt;. In Latin America, it is known that governments like Mexico and Colombia have bought such devices.&lt;br /&gt;
&lt;br /&gt;
Unfortunately fake cell towers are becoming easier to get and their price can be as low as $ 500. Depending on the model there is evidence that not only can intercept the traffic of a phone but also can also inject malware.&lt;br /&gt;
&lt;br /&gt;
'''Bold text'''==How to detect them? ==&lt;br /&gt;
&lt;br /&gt;
A first step would be to have a database of the &amp;quot;legitimate&amp;quot; cell towers and the list of legitimate companies that provide these services and have the necessary operating permits. There are some databases such as:  http://opencellid.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Opencell.png|thumbnail|center|Torres en en América Latina]]&lt;br /&gt;
&lt;br /&gt;
There is also information about the frequencies where they should operate:&lt;br /&gt;
http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
[[File:Frecuencia.png|thumbnail|center|63/5000&lt;br /&gt;
Example of frequencies in which cellular telephony can operate]]&lt;br /&gt;
&lt;br /&gt;
And you can have a look at the development of the GSM network:&lt;br /&gt;
 http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
There are also some applications that can be downloaded from the following free app repository:&lt;br /&gt;
F-Droid is a software repository (or &amp;quot;app store&amp;quot;) for Android applications, similar to the Google Play store. The main repository, hosted by the project, contains only apps which are free software. Applications can be browsed and installed from the F-Droid website or client app without the need to register for an account. &amp;quot;Anti-features&amp;quot; such as advertising, user tracking, or dependence on non-free software are flagged in app descriptions.[3] The website also offers the source code of applications it hosts as well as the software running the F-Droid server, allowing anyone to set up their own app repository.&lt;br /&gt;
&lt;br /&gt;
In order to detect possible false antennas, you can download from F-Droid the following applications:&lt;br /&gt;
&lt;br /&gt;
[http://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/ Android IMSI Catcher Detector]&lt;br /&gt;
&lt;br /&gt;
[[File:AIMSICD-Teaser.png|400px|thumbnail|center|AIMSICD]]&lt;br /&gt;
&lt;br /&gt;
Android IMSI Catcher Detector attempts to detect IMSI-Catchers through detection methods such as: Check Tower Information Consistency,   Check LAC/Cell ID Consistency, check Neighbouring Cell Info, prevent silent app installations, monitor Signal Strength, detect silent SMS and detect FemtoCells&lt;br /&gt;
&lt;br /&gt;
[https://opensource.srlabs.de/projects/snoopsnitch Snoopsnitch]&lt;br /&gt;
&lt;br /&gt;
[[File:Sc catcher hour.png|200px|thumbnail|center|Snoopsnitch]]&lt;br /&gt;
&lt;br /&gt;
SnoopSnitch is an Android app that collects and analyzes mobile radio data to make you aware of your mobile network security and to warn you about threats like fake base stations (IMSI catchers), user tracking and over-the-air updates. With SnoopSnitch you can use the data collected in the GSM Security Map at gsmmap.org and contribute your own data to GSM Map.  This application currently only works on Android phones with a Qualcomm chipset and a stock Android ROM (or a suitable custom ROM with Qualcomm DIAG driver). It requires root priviliges to capture mobile network data.&lt;br /&gt;
&lt;br /&gt;
== How to protect yourself from fake cell towers?==&lt;br /&gt;
&lt;br /&gt;
If your phone allows it you can change its configuration options so that it does not connect to all available cell towers. For example on an Android phone you can go to: Configuration &amp;gt;   Wireless and networks  &amp;gt; More configuration &amp;gt; Mobile networks and there you can change &amp;gt; Network preferences  GSM/UTMS for using 3G or 4G if your smart-phone allows it and also choose for &amp;gt; Network operators &amp;gt; Choosing manually the antennas to connect. &lt;br /&gt;
&lt;br /&gt;
You can also isolate your mobile using a Faraday phone pouch, please read this other tutorial on the topic &amp;lt;ref&amp;gt;https://gendersec.tacticaltech.org/wiki/index.php/Faraday_Phone_Pouch&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
-Tela_y_proceso_de_bolsa_por_killyourphone-com.jpg|Phone Pouch&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Where can I see more information?==&lt;br /&gt;
&lt;br /&gt;
http://wiki.labomedia.org/index.php/GSM&lt;br /&gt;
https://quematumovil.pimienta.org/los_imsi-catchers.html&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== The electromagnetic spectrum ==&lt;br /&gt;
The electromagnetic spectrum or electric radio spectrum is not something material, but the air space that goes from the ground to the highest part of the atmosphere. In this space, frequency bands are organized, through which airplanes, wi-fi, bluetooth, walkie talkies, radios, telephones communicate, for example 2G, 3G, 4G phone networks use different bands of the electromagnetic space, through which data is transmitted. &lt;br /&gt;
&lt;br /&gt;
For more information about the electromagnetic space:&lt;br /&gt;
https://imagine.gsfc.nasa.gov/science/toolbox/emspectrum1.html&lt;br /&gt;
https://en.wikipedia.org/wiki/Electromagnetic_spectrum&lt;br /&gt;
&lt;br /&gt;
== What is a fake cell tower?==&lt;br /&gt;
Fake cell towers (also known as IMSI catchers) are devices designed to intercept the traffic of a mobile phone and track the movements of the user's phone &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IMSI-catcher &amp;lt;/ref&amp;gt; pretending to be a &amp;quot;legitimate&amp;quot; cell tower &amp;lt;ref&amp;gt;https://www.eff.org/sls/tech/cell-site-simulators &amp;lt;/ref&amp;gt;.&lt;br /&gt;
[[File:Imsi-catcher.png|thumb|none|alt=Esquema torre falsa.|Esquema de una torre falsa de celular (modificado de [http://cybernc.com/les-imsi-catchers/ Henri-Olivier]).]]&lt;br /&gt;
&lt;br /&gt;
From the way they work IMSI catchers are considered to execute &amp;quot;man in the middle&amp;quot; attacks &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Man-in-the-middle_attack&amp;lt;/ref&amp;gt;. This is defined as an attack that acquires the ability to read, insert and modify at will, messages between two parties without either of them knowing that the link between them has been compromised. The attacker should be able to observe and intercept messages between the two victims &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IntermediateAccess &amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There is evidence that such devices have been used for surveillance purposes, for example in Ukraine the mobile phones of those attending a large demonstration were tracked and then received a mass text message stating: &amp;quot;Dear subscriber, you have been registered As a participant in a mass disturbance &amp;quot;&amp;lt;ref&amp;gt;https://antivigilancia.org/es/2015/06/la-vigilancia-y-la-protesta-social/ &amp;lt;/ref&amp;gt;. In Latin America, it is known that governments, such as Mexico and Colombia, have bought such devices.&lt;br /&gt;
&lt;br /&gt;
Unfortunately fake cell towers are becoming easier to get and their price can be as low as 500 USD. Depending on the model there is evidence that IMSI catchers can not only can intercept phone traffic, but also can also inject malware.&lt;br /&gt;
&lt;br /&gt;
'''Bold text'''==How to detect them? ==&lt;br /&gt;
&lt;br /&gt;
A first step is to have a database of the &amp;quot;legitimate&amp;quot; cell towers and the list of legitimate companies that provide these services with the necessary operating permits. Some of these databases exist, such as:  http://opencellid.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Opencell.png|thumbnail|center|Torres en en América Latina]]&lt;br /&gt;
&lt;br /&gt;
There is also information available about the frequencies on which they should operate:&lt;br /&gt;
http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
[[File:Frecuencia.png|thumbnail|center|63/5000&lt;br /&gt;
Example of frequencies on which cellular networks can operate]]&lt;br /&gt;
&lt;br /&gt;
And you can have a look at the development of the GSM network:&lt;br /&gt;
 http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
There are also some applications that can be downloaded from the following free app repository:&lt;br /&gt;
F-Droid is a software repository (or &amp;quot;app store&amp;quot;) for Android applications, similar to the Google Play store. The main repository, hosted by the project, contains only apps which are free software. Applications can be browsed and installed from the F-Droid website or client app without the need to register for an account. &amp;quot;Anti-features&amp;quot; such as advertising, user tracking, or dependence on non-free software are flagged in app descriptions.[3] The website also offers the source code of applications it hosts as well as the software running the F-Droid server, allowing anyone to set up their own app repository.&lt;br /&gt;
&lt;br /&gt;
In order to detect possible false antennas, you can download from F-Droid the following applications:&lt;br /&gt;
&lt;br /&gt;
[http://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/ Android IMSI Catcher Detector]&lt;br /&gt;
&lt;br /&gt;
[[File:AIMSICD-Teaser.png|400px|thumbnail|center|AIMSICD]]&lt;br /&gt;
&lt;br /&gt;
Android IMSI Catcher Detector attempts to detect IMSI-Catchers through detection methods such as: Check Tower Information Consistency,   Check LAC/Cell ID Consistency, check neighbouring cell info, prevent silent app installations, monitor Signal Strength, detect silent SMS and detect FemtoCells&lt;br /&gt;
&lt;br /&gt;
[https://opensource.srlabs.de/projects/snoopsnitch Snoopsnitch]&lt;br /&gt;
&lt;br /&gt;
[[File:Sc catcher hour.png|200px|thumbnail|center|Snoopsnitch]]&lt;br /&gt;
&lt;br /&gt;
SnoopSnitch is an Android app that collects and analyzes mobile radio data to make you aware of your mobile network security and to warn you about threats such as fake base stations (IMSI catchers), user tracking and over-the-air updates. With SnoopSnitch you can use the data collected in the GSM Security Map at gsmmap.org and contribute your own data to GSM Map.  This application currently only works on Android phones with a Qualcomm chipset and a stock Android ROM (or a suitable custom ROM with Qualcomm DIAG driver). It requires root priviliges to capture mobile network data.&lt;br /&gt;
&lt;br /&gt;
== How to protect yourself from fake cell towers?==&lt;br /&gt;
&lt;br /&gt;
If your phone allows it you can change its configuration options so that it does not connect to all available cell towers. For example on an Android phone you can go to: Configuration &amp;gt;   Wireless and networks  &amp;gt; More configuration &amp;gt; Mobile networks and there you can change &amp;gt; Network preferences  GSM/UTMS for using 3G or 4G if your smart-phone allows it and also choose for &amp;gt; Network operators &amp;gt; Choosing manually the antennas to connect. &lt;br /&gt;
&lt;br /&gt;
You can also isolate your mobile using a Faraday phone pouch, please read this other tutorial on the topic &amp;lt;ref&amp;gt;https://gendersec.tacticaltech.org/wiki/index.php/Faraday_Phone_Pouch&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
-Tela_y_proceso_de_bolsa_por_killyourphone-com.jpg|Phone Pouch&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Where can I see more information?==&lt;br /&gt;
&lt;br /&gt;
http://wiki.labomedia.org/index.php/GSM&lt;br /&gt;
https://quematumovil.pimienta.org/los_imsi-catchers.html&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== The electromagnetic spectrum ==&lt;br /&gt;
The electromagnetic spectrum or electric radio spectrum is not something material, but the air space that goes from the ground to the highest part of the atmosphere. Frequency bands are organized in this space, which airplanes, wi-fi, bluetooth, walkie talkies, radios, and telephones use to communicate, for example 2G, 3G, 4G phone networks all use different bands of the electromagnetic space. &lt;br /&gt;
&lt;br /&gt;
For more information about the electromagnetic space:&lt;br /&gt;
https://imagine.gsfc.nasa.gov/science/toolbox/emspectrum1.html&lt;br /&gt;
https://en.wikipedia.org/wiki/Electromagnetic_spectrum&lt;br /&gt;
&lt;br /&gt;
== What is a fake cell tower?==&lt;br /&gt;
Fake cell towers (also known as IMSI catchers) are devices designed to intercept the traffic and possibly track the movements of of a mobile phone by &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IMSI-catcher &amp;lt;/ref&amp;gt; pretending to be a &amp;quot;legitimate&amp;quot; cell tower &amp;lt;ref&amp;gt;https://www.eff.org/sls/tech/cell-site-simulators &amp;lt;/ref&amp;gt;.&lt;br /&gt;
[[File:Imsi-catcher.png|thumb|none|alt=Esquema torre falsa.|Esquema de una torre falsa de celular (modificado de [http://cybernc.com/les-imsi-catchers/ Henri-Olivier]).]]&lt;br /&gt;
&lt;br /&gt;
IMSI catcher attacks are &amp;quot;man in the middle&amp;quot; attacks &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Man-in-the-middle_attack&amp;lt;/ref&amp;gt;. This is defined as an action that gives the attacker the ability to read, insert and modify at will, messages between two parties without either of them knowing that the link between them has been compromised. The attacker should be able to observe and intercept messages between the two victims &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IntermediateAccess &amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There is evidence that such devices have been used for surveillance purposes, for example in Ukraine the mobile phones of those attending a large demonstration were tracked and then received a mass text message stating: &amp;quot;Dear subscriber, you have been registered As a participant in a mass disturbance &amp;quot;&amp;lt;ref&amp;gt;https://antivigilancia.org/es/2015/06/la-vigilancia-y-la-protesta-social/ &amp;lt;/ref&amp;gt;. In Latin America it is known that governments, such as Mexico and Colombia, have bought IMSI  Catchers.&lt;br /&gt;
&lt;br /&gt;
Unfortunately fake cell towers are becoming easier to buy and their price can be as low as 500 USD. Depending on the model there is evidence that IMSI catchers can not only can intercept phone traffic, but also can also inject malware.&lt;br /&gt;
&lt;br /&gt;
'''Bold text'''==How to detect them? ==&lt;br /&gt;
&lt;br /&gt;
A first step is to have a database of the &amp;quot;legitimate&amp;quot; cell towers and the list of legitimate companies that provide these services with the necessary operating permits. In some places these databases exist, such as:  http://opencellid.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Opencell.png|thumbnail|center|Torres en en América Latina]]&lt;br /&gt;
&lt;br /&gt;
There is also information publicly available about the frequencies on which they should operate:&lt;br /&gt;
http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
[[File:Frecuencia.png|thumbnail|center|63/5000&lt;br /&gt;
Example of frequencies on which cellular networks can operate]]&lt;br /&gt;
&lt;br /&gt;
And you can also monitor the development of the GSM network:&lt;br /&gt;
 http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
There are also some applications that can be downloaded from F-Droid&lt;br /&gt;
(F-Droid is an alternative to Google Play Centre, where you can download free and open source Android apps independently of Google)&lt;br /&gt;
&lt;br /&gt;
To detect possible false antennas:&lt;br /&gt;
&lt;br /&gt;
[http://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/ Android IMSI Catcher Detector]&lt;br /&gt;
&lt;br /&gt;
[[File:AIMSICD-Teaser.png|400px|thumbnail|center|AIMSICD]]&lt;br /&gt;
&lt;br /&gt;
Android IMSI Catcher Detector attempts to detect IMSI-Catchers through detection methods such as: Check Tower Information Consistency,   Check LAC/Cell ID Consistency, check neighbouring cell info, prevent silent app installations, monitor Signal Strength, detect silent SMS and detect FemtoCells&lt;br /&gt;
&lt;br /&gt;
[https://opensource.srlabs.de/projects/snoopsnitch Snoopsnitch]&lt;br /&gt;
&lt;br /&gt;
[[File:Sc catcher hour.png|200px|thumbnail|center|Snoopsnitch]]&lt;br /&gt;
&lt;br /&gt;
SnoopSnitch is an Android app that collects and analyzes mobile radio data that can warn you about threats such as fake base stations (IMSI catchers), user tracking and over-the-air updates. With SnoopSnitch you can use the data collected in the GSM Security Map at gsmmap.org and contribute your own data to GSM Map.  This application currently only works on Android phones with a Qualcomm chipset and a stock Android ROM (or a suitable custom ROM with Qualcomm DIAG driver). It also requires root privileges to capture mobile network data.&lt;br /&gt;
&lt;br /&gt;
== How to protect yourself from fake cell towers?==&lt;br /&gt;
&lt;br /&gt;
Some phones allow you to change their configuration options so that they do not connect to all available cell towers. For example on an Android phone you can go to: Settings &amp;gt;   Wireless and networks  &amp;gt; More &amp;gt; Mobile networks and there you can change &amp;gt; Preferred network type  GSM/UTMS for using 3G or 4G if your smart-phone allows it and also choose &amp;lt;Network operators &amp;gt; Select  antennas manually. &lt;br /&gt;
&lt;br /&gt;
You can also isolate your mobile using a Faraday phone pouch, please this tutorial on the topic &amp;lt;ref&amp;gt;https://gendersec.tacticaltech.org/wiki/index.php/Faraday_Phone_Pouch&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
-Tela_y_proceso_de_bolsa_por_killyourphone-com.jpg|Phone Pouch&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Where can I see more information?==&lt;br /&gt;
&lt;br /&gt;
http://wiki.labomedia.org/index.php/GSM&lt;br /&gt;
https://quematumovil.pimienta.org/los_imsi-catchers.html&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== The electromagnetic spectrum ==&lt;br /&gt;
The electromagnetic spectrum or electric radio spectrum is not something material, but the air space that goes from the ground to the highest part of the atmosphere. In this space, frequency bands are organized, through which airplanes, wi-fi, bluetooth, walkie talkies, radios, telephones communicate, for example 2G, 3G, 4G phone networks use different bands of the electromagnetic space, through which data is transmitted. &lt;br /&gt;
&lt;br /&gt;
For more information about the electromagnetic space:&lt;br /&gt;
https://imagine.gsfc.nasa.gov/science/toolbox/emspectrum1.html&lt;br /&gt;
https://en.wikipedia.org/wiki/Electromagnetic_spectrum&lt;br /&gt;
&lt;br /&gt;
== What is a fake cell tower?==&lt;br /&gt;
Fake cell towers (also known as IMSI catchers) are devices designed to intercept the traffic of a mobile phone and track the movements of the user's phone &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IMSI-catcher &amp;lt;/ref&amp;gt; pretending to be a &amp;quot;legitimate&amp;quot; cell tower &amp;lt;ref&amp;gt;https://www.eff.org/sls/tech/cell-site-simulators &amp;lt;/ref&amp;gt;.&lt;br /&gt;
[[File:Imsi-catcher.png|thumb|none|alt=Esquema torre falsa.|Esquema de una torre falsa de celular (modificado de [http://cybernc.com/les-imsi-catchers/ Henri-Olivier]).]]&lt;br /&gt;
&lt;br /&gt;
From the way they work IMSI catchers are considered to execute &amp;quot;man in the middle&amp;quot; attacks &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Man-in-the-middle_attack&amp;lt;/ref&amp;gt;. This is defined as an attack that acquires the ability to read, insert and modify at will, messages between two parties without either of them knowing that the link between them has been compromised. The attacker should be able to observe and intercept messages between the two victims &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IntermediateAccess &amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There is evidence that such devices have been used for surveillance purposes, for example in Ukraine the mobile phones of those attending a large demonstration were tracked and then received a mass text message stating: &amp;quot;Dear subscriber, you have been registered As a participant in a mass disturbance &amp;quot;&amp;lt;ref&amp;gt;https://antivigilancia.org/es/2015/06/la-vigilancia-y-la-protesta-social/ &amp;lt;/ref&amp;gt;. In Latin America, it is known that governments, such as Mexico and Colombia, have bought such devices.&lt;br /&gt;
&lt;br /&gt;
Unfortunately fake cell towers are becoming easier to get and their price can be as low as 500 USD. Depending on the model there is evidence that IMSI catchers can not only can intercept phone traffic, but also can also inject malware.&lt;br /&gt;
&lt;br /&gt;
'''Bold text'''==How to detect them? ==&lt;br /&gt;
&lt;br /&gt;
A first step is to have a database of the &amp;quot;legitimate&amp;quot; cell towers and the list of legitimate companies that provide these services with the necessary operating permits. Some of these databases exist, such as:  http://opencellid.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Opencell.png|thumbnail|center|Torres en en América Latina]]&lt;br /&gt;
&lt;br /&gt;
There is also information available about the frequencies on which they should operate:&lt;br /&gt;
http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
[[File:Frecuencia.png|thumbnail|center|63/5000&lt;br /&gt;
Example of frequencies on which cellular networks can operate]]&lt;br /&gt;
&lt;br /&gt;
And you can have a look at the development of the GSM network:&lt;br /&gt;
 http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
There are also some applications that can be downloaded from the following free app repository:&lt;br /&gt;
F-Droid is a software repository (or &amp;quot;app store&amp;quot;) for Android applications, similar to the Google Play store. The main repository, hosted by the project, contains only apps which are free software. Applications can be browsed and installed from the F-Droid website or client app without the need to register for an account. &amp;quot;Anti-features&amp;quot; such as advertising, user tracking, or dependence on non-free software are flagged in app descriptions.[3] The website also offers the source code of applications it hosts as well as the software running the F-Droid server, allowing anyone to set up their own app repository.&lt;br /&gt;
&lt;br /&gt;
In order to detect possible false antennas, you can download from F-Droid the following applications:&lt;br /&gt;
&lt;br /&gt;
[http://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/ Android IMSI Catcher Detector]&lt;br /&gt;
&lt;br /&gt;
[[File:AIMSICD-Teaser.png|400px|thumbnail|center|AIMSICD]]&lt;br /&gt;
&lt;br /&gt;
Android IMSI Catcher Detector attempts to detect IMSI-Catchers through detection methods such as: Check Tower Information Consistency,   Check LAC/Cell ID Consistency, check neighbouring cell info, prevent silent app installations, monitor Signal Strength, detect silent SMS and detect FemtoCells&lt;br /&gt;
&lt;br /&gt;
[https://opensource.srlabs.de/projects/snoopsnitch Snoopsnitch]&lt;br /&gt;
&lt;br /&gt;
[[File:Sc catcher hour.png|200px|thumbnail|center|Snoopsnitch]]&lt;br /&gt;
&lt;br /&gt;
SnoopSnitch is an Android app that collects and analyzes mobile radio data to make you aware of your mobile network security and to warn you about threats such as fake base stations (IMSI catchers), user tracking and over-the-air updates. With SnoopSnitch you can use the data collected in the GSM Security Map at gsmmap.org and contribute your own data to GSM Map.  This application currently only works on Android phones with a Qualcomm chipset and a stock Android ROM (or a suitable custom ROM with Qualcomm DIAG driver). It requires root priviliges to capture mobile network data.&lt;br /&gt;
&lt;br /&gt;
== How to protect yourself from fake cell towers?==&lt;br /&gt;
&lt;br /&gt;
If your phone allows it you can change its configuration options so that it does not connect to all available cell towers. For example on an Android phone you can go to: Configuration &amp;gt;   Wireless and networks  &amp;gt; More configuration &amp;gt; Mobile networks and there you can change &amp;gt; Network preferences  GSM/UTMS for using 3G or 4G if your smart-phone allows it and also choose for &amp;gt; Network operators &amp;gt; Choosing manually the antennas to connect. &lt;br /&gt;
&lt;br /&gt;
You can also isolate your mobile using a Faraday phone pouch, please read this other tutorial on the topic &amp;lt;ref&amp;gt;https://gendersec.tacticaltech.org/wiki/index.php/Faraday_Phone_Pouch&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
-Tela_y_proceso_de_bolsa_por_killyourphone-com.jpg|Phone Pouch&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Where can I see more information?==&lt;br /&gt;
&lt;br /&gt;
http://wiki.labomedia.org/index.php/GSM&lt;br /&gt;
https://quematumovil.pimienta.org/los_imsi-catchers.html&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Detect_false_mobile_antennas&amp;diff=8971</id>
		<title>Detect false mobile antennas</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Detect_false_mobile_antennas&amp;diff=8971"/>
				<updated>2017-03-16T14:25:15Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== The electromagnetic spectrum ==&lt;br /&gt;
The electromagnetic spectrum or electric radio spectrum is not something material, but the space that is in the air that goes from the ground to the highest part of the sky. In this space, bands frequencies through which airplanes, wi-fi, bluetooth, walkie talkies, radios, telephones communicate are organized. The fact that our phones can be 2G, 3G, 4G means that they are using different bands of the electromagnetic space, through which the information circulates.&lt;br /&gt;
&lt;br /&gt;
For more information about the electromagnetic space:&lt;br /&gt;
https://imagine.gsfc.nasa.gov/science/toolbox/emspectrum1.html&lt;br /&gt;
https://en.wikipedia.org/wiki/Electromagnetic_spectrum&lt;br /&gt;
&lt;br /&gt;
== What is a fake cell tower?==&lt;br /&gt;
Fake cell towers (also known as IMSI catcher) are devices designed to intercept the traffic of a mobile phone and track the movements of the user's phone &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IMSI-catcher &amp;lt;/ref&amp;gt; pretending to be a &amp;quot;legitimate&amp;quot; cell tower &amp;lt;ref&amp;gt;https://www.eff.org/sls/tech/cell-site-simulators &amp;lt;/ref&amp;gt;.&lt;br /&gt;
[[File:Imsi-catcher.png|thumb|none|alt=Esquema torre falsa.|Esquema de una torre falsa de celular (modificado de [http://cybernc.com/les-imsi-catchers/ Henri-Olivier]).]]&lt;br /&gt;
&lt;br /&gt;
By the way they work IMSI catcher are considered a &amp;quot;man in the middle&amp;quot; attack &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Man-in-the-middle_attack&amp;lt;/ref&amp;gt;. This is defined as an attack that acquires the ability to read, insert and modify at will, messages between two parties without any of them knowing that the link between them has been violated. The attacker should be able to observe and intercept messages between the two victims &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IntermediateAccess &amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There is evidence that such devices have been used for surveillance purposes, for example in Ukraine the mobile phones of those attending a large demonstration were tracked and then massively received a text message stating &amp;quot;Dear subscriber, you have been registered As a participant in a mass disturbance &amp;quot;&amp;lt;ref&amp;gt;https://antivigilancia.org/es/2015/06/la-vigilancia-y-la-protesta-social/ &amp;lt;/ref&amp;gt;. In Latin America, it is known that governments like Mexico and Colombia have bought such devices.&lt;br /&gt;
&lt;br /&gt;
Unfortunately fake cell towers are becoming easier to get and their price can be as low as $ 500. Depending on the model there is evidence that not only can intercept the traffic of a phone but also can also inject malware.&lt;br /&gt;
&lt;br /&gt;
'''Bold text'''==How to detect them? ==&lt;br /&gt;
&lt;br /&gt;
A first step would be to have a database of the &amp;quot;legitimate&amp;quot; cell towers and the list of legitimate companies that provide these services and have the necessary operating permits. There are some databases such as:  http://opencellid.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Opencell.png|thumbnail|center|Torres en en América Latina]]&lt;br /&gt;
&lt;br /&gt;
There is also information about the frequencies where they should operate:&lt;br /&gt;
http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
[[File:Frecuencia.png|thumbnail|center|63/5000&lt;br /&gt;
Example of frequencies in which cellular telephony can operate]]&lt;br /&gt;
&lt;br /&gt;
And you can have a look at the development of the GSM network:&lt;br /&gt;
 http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
There are also some applications that can be downloaded from the following free app repository:&lt;br /&gt;
F-Droid is a software repository (or &amp;quot;app store&amp;quot;) for Android applications, similar to the Google Play store. The main repository, hosted by the project, contains only apps which are free software. Applications can be browsed and installed from the F-Droid website or client app without the need to register for an account. &amp;quot;Anti-features&amp;quot; such as advertising, user tracking, or dependence on non-free software are flagged in app descriptions.[3] The website also offers the source code of applications it hosts as well as the software running the F-Droid server, allowing anyone to set up their own app repository.&lt;br /&gt;
&lt;br /&gt;
In order to detect possible false antennas, you can download from F-Droid the following applications:&lt;br /&gt;
&lt;br /&gt;
[http://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/ Android IMSI Catcher Detector]&lt;br /&gt;
&lt;br /&gt;
[[File:AIMSICD-Teaser.png|400px|thumbnail|center|AIMSICD]]&lt;br /&gt;
&lt;br /&gt;
Android IMSI Catcher Detector attempts to detect IMSI-Catchers through detection methods such as: Check Tower Information Consistency,   Check LAC/Cell ID Consistency, check Neighbouring Cell Info, prevent silent app installations, monitor Signal Strength, detect silent SMS and detect FemtoCells&lt;br /&gt;
&lt;br /&gt;
[https://opensource.srlabs.de/projects/snoopsnitch Snoopsnitch]&lt;br /&gt;
&lt;br /&gt;
[[File:Sc catcher hour.png|200px|thumbnail|center|Snoopsnitch]]&lt;br /&gt;
&lt;br /&gt;
SnoopSnitch is an Android app that collects and analyzes mobile radio data to make you aware of your mobile network security and to warn you about threats like fake base stations (IMSI catchers), user tracking and over-the-air updates. With SnoopSnitch you can use the data collected in the GSM Security Map at gsmmap.org and contribute your own data to GSM Map.  This application currently only works on Android phones with a Qualcomm chipset and a stock Android ROM (or a suitable custom ROM with Qualcomm DIAG driver). It requires root priviliges to capture mobile network data.&lt;br /&gt;
&lt;br /&gt;
== How to protect yourself from fake cell towers?==&lt;br /&gt;
&lt;br /&gt;
If your phone allows it you can change its configuration options so that it does not connect to all available cell towers. For example on an Android phone you can go to: Configuration &amp;gt;   Wireless and networks  &amp;gt; More configuration &amp;gt; Mobile networks and there you can change &amp;gt; Network preferences  GSM/UTMS for using 3G or 4G if your smart-phone allows it and also choose for &amp;gt; Network operators &amp;gt; Choosing manually the antennas to connect. &lt;br /&gt;
&lt;br /&gt;
You can also isolate your mobile using a Faraday phone pouch, please read this other tutorial on the topic &amp;lt;ref&amp;gt;https://gendersec.tacticaltech.org/wiki/index.php/Faraday_Phone_Pouch&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
-Tela_y_proceso_de_bolsa_por_killyourphone-com.jpg|Phone Pouch&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Where can I see more information?==&lt;br /&gt;
&lt;br /&gt;
http://wiki.labomedia.org/index.php/GSM&lt;br /&gt;
https://quematumovil.pimienta.org/los_imsi-catchers.html&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== The electromagnetic spectrum ==&lt;br /&gt;
The electromagnetic spectrum or electric radio spectrum is not something material, but the air space that goes from the ground to the highest part of the atmosphere. In this space, frequency bands are organized, through which airplanes, wi-fi, bluetooth, walkie talkies, radios, telephones communicate, for example 2G, 3G, 4G phone networks use different bands of the electromagnetic space, through which data is transmitted. &lt;br /&gt;
&lt;br /&gt;
For more information about the electromagnetic space:&lt;br /&gt;
https://imagine.gsfc.nasa.gov/science/toolbox/emspectrum1.html&lt;br /&gt;
https://en.wikipedia.org/wiki/Electromagnetic_spectrum&lt;br /&gt;
&lt;br /&gt;
== What is a fake cell tower?==&lt;br /&gt;
Fake cell towers (also known as IMSI catchers) are devices designed to intercept the traffic of a mobile phone and track the movements of the user's phone &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IMSI-catcher &amp;lt;/ref&amp;gt; pretending to be a &amp;quot;legitimate&amp;quot; cell tower &amp;lt;ref&amp;gt;https://www.eff.org/sls/tech/cell-site-simulators &amp;lt;/ref&amp;gt;.&lt;br /&gt;
[[File:Imsi-catcher.png|thumb|none|alt=Esquema torre falsa.|Esquema de una torre falsa de celular (modificado de [http://cybernc.com/les-imsi-catchers/ Henri-Olivier]).]]&lt;br /&gt;
&lt;br /&gt;
From the way they work IMSI catchers are considered to execute &amp;quot;man in the middle&amp;quot; attacks &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Man-in-the-middle_attack&amp;lt;/ref&amp;gt;. This is defined as an attack that acquires the ability to read, insert and modify at will, messages between two parties without either of them knowing that the link between them has been compromised. The attacker should be able to observe and intercept messages between the two victims &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IntermediateAccess &amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There is evidence that such devices have been used for surveillance purposes, for example in Ukraine the mobile phones of those attending a large demonstration were tracked and then received a mass text message stating: &amp;quot;Dear subscriber, you have been registered As a participant in a mass disturbance &amp;quot;&amp;lt;ref&amp;gt;https://antivigilancia.org/es/2015/06/la-vigilancia-y-la-protesta-social/ &amp;lt;/ref&amp;gt;. In Latin America, it is known that governments, such as Mexico and Colombia, have bought such devices.&lt;br /&gt;
&lt;br /&gt;
Unfortunately fake cell towers are becoming easier to get and their price can be as low as 500 USD. Depending on the model there is evidence that IMSI catchers can not only can intercept phone traffic, but also can also inject malware.&lt;br /&gt;
&lt;br /&gt;
'''Bold text'''==How to detect them? ==&lt;br /&gt;
&lt;br /&gt;
A first step is to have a database of the &amp;quot;legitimate&amp;quot; cell towers and the list of legitimate companies that provide these services with the necessary operating permits. Some of these databases exist, such as:  http://opencellid.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Opencell.png|thumbnail|center|Torres en en América Latina]]&lt;br /&gt;
&lt;br /&gt;
There is also information available about the frequencies on which they should operate:&lt;br /&gt;
http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
[[File:Frecuencia.png|thumbnail|center|63/5000&lt;br /&gt;
Example of frequencies on which cellular networks can operate]]&lt;br /&gt;
&lt;br /&gt;
And you can have a look at the development of the GSM network:&lt;br /&gt;
 http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
There are also some applications that can be downloaded from the following free app repository:&lt;br /&gt;
F-Droid is a software repository (or &amp;quot;app store&amp;quot;) for Android applications, similar to the Google Play store. The main repository, hosted by the project, contains only apps which are free software. Applications can be browsed and installed from the F-Droid website or client app without the need to register for an account. &amp;quot;Anti-features&amp;quot; such as advertising, user tracking, or dependence on non-free software are flagged in app descriptions.[3] The website also offers the source code of applications it hosts as well as the software running the F-Droid server, allowing anyone to set up their own app repository.&lt;br /&gt;
&lt;br /&gt;
In order to detect possible false antennas, you can download from F-Droid the following applications:&lt;br /&gt;
&lt;br /&gt;
[http://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/ Android IMSI Catcher Detector]&lt;br /&gt;
&lt;br /&gt;
[[File:AIMSICD-Teaser.png|400px|thumbnail|center|AIMSICD]]&lt;br /&gt;
&lt;br /&gt;
Android IMSI Catcher Detector attempts to detect IMSI-Catchers through detection methods such as: Check Tower Information Consistency,   Check LAC/Cell ID Consistency, check neighbouring cell info, prevent silent app installations, monitor Signal Strength, detect silent SMS and detect FemtoCells&lt;br /&gt;
&lt;br /&gt;
[https://opensource.srlabs.de/projects/snoopsnitch Snoopsnitch]&lt;br /&gt;
&lt;br /&gt;
[[File:Sc catcher hour.png|200px|thumbnail|center|Snoopsnitch]]&lt;br /&gt;
&lt;br /&gt;
SnoopSnitch is an Android app that collects and analyzes mobile radio data to make you aware of your mobile network security and to warn you about threats such as fake base stations (IMSI catchers), user tracking and over-the-air updates. With SnoopSnitch you can use the data collected in the GSM Security Map at gsmmap.org and contribute your own data to GSM Map.  This application currently only works on Android phones with a Qualcomm chipset and a stock Android ROM (or a suitable custom ROM with Qualcomm DIAG driver). It requires root priviliges to capture mobile network data.&lt;br /&gt;
&lt;br /&gt;
== How to protect yourself from fake cell towers?==&lt;br /&gt;
&lt;br /&gt;
If your phone allows it you can change its configuration options so that it does not connect to all available cell towers. For example on an Android phone you can go to: Configuration &amp;gt;   Wireless and networks  &amp;gt; More configuration &amp;gt; Mobile networks and there you can change &amp;gt; Network preferences  GSM/UTMS for using 3G or 4G if your smart-phone allows it and also choose for &amp;gt; Network operators &amp;gt; Choosing manually the antennas to connect. &lt;br /&gt;
&lt;br /&gt;
You can also isolate your mobile using a Faraday phone pouch, please read this other tutorial on the topic &amp;lt;ref&amp;gt;https://gendersec.tacticaltech.org/wiki/index.php/Faraday_Phone_Pouch&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
-Tela_y_proceso_de_bolsa_por_killyourphone-com.jpg|Phone Pouch&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Where can I see more information?==&lt;br /&gt;
&lt;br /&gt;
http://wiki.labomedia.org/index.php/GSM&lt;br /&gt;
https://quematumovil.pimienta.org/los_imsi-catchers.html&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== The electromagnetic spectrum ==&lt;br /&gt;
The electromagnetic spectrum or electric radio spectrum is not something material, but the air space that goes from the ground to the highest part of the atmosphere. In this space, frequency bands are organized, through which airplanes, wi-fi, bluetooth, walkie talkies, radios, telephones communicate, for example 2G, 3G, 4G phone networks use different bands of the electromagnetic space, through which data is transmitted. &lt;br /&gt;
&lt;br /&gt;
For more information about the electromagnetic space:&lt;br /&gt;
https://imagine.gsfc.nasa.gov/science/toolbox/emspectrum1.html&lt;br /&gt;
https://en.wikipedia.org/wiki/Electromagnetic_spectrum&lt;br /&gt;
&lt;br /&gt;
== What is a fake cell tower?==&lt;br /&gt;
Fake cell towers (also known as IMSI catchers) are devices designed to intercept the traffic of a mobile phone and track the movements of the user's phone &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IMSI-catcher &amp;lt;/ref&amp;gt; pretending to be a &amp;quot;legitimate&amp;quot; cell tower &amp;lt;ref&amp;gt;https://www.eff.org/sls/tech/cell-site-simulators &amp;lt;/ref&amp;gt;.&lt;br /&gt;
[[File:Imsi-catcher.png|thumb|none|alt=Esquema torre falsa.|Esquema de una torre falsa de celular (modificado de [http://cybernc.com/les-imsi-catchers/ Henri-Olivier]).]]&lt;br /&gt;
&lt;br /&gt;
From the way they work IMSI catchers are considered to execute &amp;quot;man in the middle&amp;quot; attacks &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Man-in-the-middle_attack&amp;lt;/ref&amp;gt;. This is defined as an attack that acquires the ability to read, insert and modify at will, messages between two parties without either of them knowing that the link between them has been compromised. The attacker should be able to observe and intercept messages between the two victims &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IntermediateAccess &amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There is evidence that such devices have been used for surveillance purposes, for example in Ukraine the mobile phones of those attending a large demonstration were tracked and then received a mass text message stating: &amp;quot;Dear subscriber, you have been registered As a participant in a mass disturbance &amp;quot;&amp;lt;ref&amp;gt;https://antivigilancia.org/es/2015/06/la-vigilancia-y-la-protesta-social/ &amp;lt;/ref&amp;gt;. In Latin America, it is known that governments, such as Mexico and Colombia, have bought such devices.&lt;br /&gt;
&lt;br /&gt;
Unfortunately fake cell towers are becoming easier to get and their price can be as low as 500 USD. Depending on the model there is evidence that IMSI catchers can not only can intercept phone traffic, but also can also inject malware.&lt;br /&gt;
&lt;br /&gt;
'''Bold text'''==How to detect them? ==&lt;br /&gt;
&lt;br /&gt;
A first step is to have a database of the &amp;quot;legitimate&amp;quot; cell towers and the list of legitimate companies that provide these services with the necessary operating permits. Some of these databases exist, such as:  http://opencellid.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Opencell.png|thumbnail|center|Torres en en América Latina]]&lt;br /&gt;
&lt;br /&gt;
There is also information available about the frequencies on which they should operate:&lt;br /&gt;
http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
[[File:Frecuencia.png|thumbnail|center|63/5000&lt;br /&gt;
Example of frequencies on which cellular networks can operate]]&lt;br /&gt;
&lt;br /&gt;
And you can have a look at the development of the GSM network:&lt;br /&gt;
 http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
There are also some applications that can be downloaded from the following free app repository:&lt;br /&gt;
F-Droid is a software repository (or &amp;quot;app store&amp;quot;) for Android applications, similar to the Google Play store. The main repository, hosted by the project, contains only apps which are free software. Applications can be browsed and installed from the F-Droid website or client app without the need to register for an account. &amp;quot;Anti-features&amp;quot; such as advertising, user tracking, or dependence on non-free software are flagged in app descriptions.[3] The website also offers the source code of applications it hosts as well as the software running the F-Droid server, allowing anyone to set up their own app repository.&lt;br /&gt;
&lt;br /&gt;
In order to detect possible false antennas, you can download from F-Droid the following applications:&lt;br /&gt;
&lt;br /&gt;
[http://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/ Android IMSI Catcher Detector]&lt;br /&gt;
&lt;br /&gt;
[[File:AIMSICD-Teaser.png|400px|thumbnail|center|AIMSICD]]&lt;br /&gt;
&lt;br /&gt;
Android IMSI Catcher Detector attempts to detect IMSI-Catchers through detection methods such as: Check Tower Information Consistency,   Check LAC/Cell ID Consistency, check neighbouring cell info, prevent silent app installations, monitor Signal Strength, detect silent SMS and detect FemtoCells&lt;br /&gt;
&lt;br /&gt;
[https://opensource.srlabs.de/projects/snoopsnitch Snoopsnitch]&lt;br /&gt;
&lt;br /&gt;
[[File:Sc catcher hour.png|200px|thumbnail|center|Snoopsnitch]]&lt;br /&gt;
&lt;br /&gt;
SnoopSnitch is an Android app that collects and analyzes mobile radio data to make you aware of your mobile network security and to warn you about threats such as fake base stations (IMSI catchers), user tracking and over-the-air updates. With SnoopSnitch you can use the data collected in the GSM Security Map at gsmmap.org and contribute your own data to GSM Map.  This application currently only works on Android phones with a Qualcomm chipset and a stock Android ROM (or a suitable custom ROM with Qualcomm DIAG driver). It requires root priviliges to capture mobile network data.&lt;br /&gt;
&lt;br /&gt;
== How to protect yourself from fake cell towers?==&lt;br /&gt;
&lt;br /&gt;
If your phone allows it you can change its configuration options so that it does not connect to all available cell towers. For example on an Android phone you can go to: Configuration &amp;gt;   Wireless and networks  &amp;gt; More configuration &amp;gt; Mobile networks and there you can change &amp;gt; Network preferences  GSM/UTMS for using 3G or 4G if your smart-phone allows it and also choose for &amp;gt; Network operators &amp;gt; Choosing manually the antennas to connect. &lt;br /&gt;
&lt;br /&gt;
You can also isolate your mobile using a Faraday phone pouch, please read this other tutorial on the topic &amp;lt;ref&amp;gt;https://gendersec.tacticaltech.org/wiki/index.php/Faraday_Phone_Pouch&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
-Tela_y_proceso_de_bolsa_por_killyourphone-com.jpg|Phone Pouch&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Where can I see more information?==&lt;br /&gt;
&lt;br /&gt;
http://wiki.labomedia.org/index.php/GSM&lt;br /&gt;
https://quematumovil.pimienta.org/los_imsi-catchers.html&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== The electromagnetic spectrum ==&lt;br /&gt;
The electromagnetic spectrum or electric radio spectrum is not something material, but the air space that goes from the ground to the highest part of the atmosphere. In this space, frequency bands are organized, through which airplanes, wi-fi, bluetooth, walkie talkies, radios, telephones communicate, for example 2G, 3G, 4G phone networks use different bands of the electromagnetic space, through which data is transmitted. &lt;br /&gt;
&lt;br /&gt;
For more information about the electromagnetic space:&lt;br /&gt;
https://imagine.gsfc.nasa.gov/science/toolbox/emspectrum1.html&lt;br /&gt;
https://en.wikipedia.org/wiki/Electromagnetic_spectrum&lt;br /&gt;
&lt;br /&gt;
== What is a fake cell tower?==&lt;br /&gt;
Fake cell towers (also known as IMSI catchers) are devices designed to intercept the traffic of a mobile phone and track the movements of the user's phone &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IMSI-catcher &amp;lt;/ref&amp;gt; pretending to be a &amp;quot;legitimate&amp;quot; cell tower &amp;lt;ref&amp;gt;https://www.eff.org/sls/tech/cell-site-simulators &amp;lt;/ref&amp;gt;.&lt;br /&gt;
[[File:Imsi-catcher.png|thumb|none|alt=Esquema torre falsa.|Esquema de una torre falsa de celular (modificado de [http://cybernc.com/les-imsi-catchers/ Henri-Olivier]).]]&lt;br /&gt;
&lt;br /&gt;
From the way they work IMSI catchers are considered to execute &amp;quot;man in the middle&amp;quot; attacks &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Man-in-the-middle_attack&amp;lt;/ref&amp;gt;. This is defined as an attack that acquires the ability to read, insert and modify at will, messages between two parties without either of them knowing that the link between them has been compromised. The attacker should be able to observe and intercept messages between the two victims &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IntermediateAccess &amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There is evidence that such devices have been used for surveillance purposes, for example in Ukraine the mobile phones of those attending a large demonstration were tracked and then received a mass text message stating: &amp;quot;Dear subscriber, you have been registered As a participant in a mass disturbance &amp;quot;&amp;lt;ref&amp;gt;https://antivigilancia.org/es/2015/06/la-vigilancia-y-la-protesta-social/ &amp;lt;/ref&amp;gt;. In Latin America, it is known that governments, such as Mexico and Colombia, have bought such devices.&lt;br /&gt;
&lt;br /&gt;
Unfortunately fake cell towers are becoming easier to get and their price can be as low as 500 USD. Depending on the model there is evidence that IMSI catchers can not only can intercept phone traffic, but also can also inject malware.&lt;br /&gt;
&lt;br /&gt;
'''Bold text'''==How to detect them? ==&lt;br /&gt;
&lt;br /&gt;
A first step is to have a database of the &amp;quot;legitimate&amp;quot; cell towers and the list of legitimate companies that provide these services with the necessary operating permits. Some of these databases exist, such as:  http://opencellid.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Opencell.png|thumbnail|center|Torres en en América Latina]]&lt;br /&gt;
&lt;br /&gt;
There is also information available about the frequencies on which they should operate:&lt;br /&gt;
http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
[[File:Frecuencia.png|thumbnail|center|63/5000&lt;br /&gt;
Example of frequencies on which cellular networks can operate]]&lt;br /&gt;
&lt;br /&gt;
And you can have a look at the development of the GSM network:&lt;br /&gt;
 http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
There are also some applications that can be downloaded from the following free app repository:&lt;br /&gt;
F-Droid is a software repository (or &amp;quot;app store&amp;quot;) for Android applications, similar to the Google Play store. The main repository, hosted by the project, contains only apps which are free software. Applications can be browsed and installed from the F-Droid website or client app without the need to register for an account. &amp;quot;Anti-features&amp;quot; such as advertising, user tracking, or dependence on non-free software are flagged in app descriptions.[3] The website also offers the source code of applications it hosts as well as the software running the F-Droid server, allowing anyone to set up their own app repository.&lt;br /&gt;
&lt;br /&gt;
In order to detect possible false antennas, you can download from F-Droid the following applications:&lt;br /&gt;
&lt;br /&gt;
[http://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/ Android IMSI Catcher Detector]&lt;br /&gt;
&lt;br /&gt;
[[File:AIMSICD-Teaser.png|400px|thumbnail|center|AIMSICD]]&lt;br /&gt;
&lt;br /&gt;
Android IMSI Catcher Detector attempts to detect IMSI-Catchers through detection methods such as: Check Tower Information Consistency,   Check LAC/Cell ID Consistency, check neighbouring cell info, prevent silent app installations, monitor Signal Strength, detect silent SMS and detect FemtoCells&lt;br /&gt;
&lt;br /&gt;
[https://opensource.srlabs.de/projects/snoopsnitch Snoopsnitch]&lt;br /&gt;
&lt;br /&gt;
[[File:Sc catcher hour.png|200px|thumbnail|center|Snoopsnitch]]&lt;br /&gt;
&lt;br /&gt;
SnoopSnitch is an Android app that collects and analyzes mobile radio data to make you aware of your mobile network security and to warn you about threats such as fake base stations (IMSI catchers), user tracking and over-the-air updates. With SnoopSnitch you can use the data collected in the GSM Security Map at gsmmap.org and contribute your own data to GSM Map.  This application currently only works on Android phones with a Qualcomm chipset and a stock Android ROM (or a suitable custom ROM with Qualcomm DIAG driver). It requires root priviliges to capture mobile network data.&lt;br /&gt;
&lt;br /&gt;
== How to protect yourself from fake cell towers?==&lt;br /&gt;
&lt;br /&gt;
If your phone allows it you can change its configuration options so that it does not connect to all available cell towers. For example on an Android phone you can go to: Configuration &amp;gt;   Wireless and networks  &amp;gt; More configuration &amp;gt; Mobile networks and there you can change &amp;gt; Network preferences  GSM/UTMS for using 3G or 4G if your smart-phone allows it and also choose for &amp;gt; Network operators &amp;gt; Choosing manually the antennas to connect. &lt;br /&gt;
&lt;br /&gt;
You can also isolate your mobile using a Faraday phone pouch, please read this other tutorial on the topic &amp;lt;ref&amp;gt;https://gendersec.tacticaltech.org/wiki/index.php/Faraday_Phone_Pouch&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
-Tela_y_proceso_de_bolsa_por_killyourphone-com.jpg|Phone Pouch&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Where can I see more information?==&lt;br /&gt;
&lt;br /&gt;
http://wiki.labomedia.org/index.php/GSM&lt;br /&gt;
https://quematumovil.pimienta.org/los_imsi-catchers.html&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Detect_false_mobile_antennas&amp;diff=8970</id>
		<title>Detect false mobile antennas</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Detect_false_mobile_antennas&amp;diff=8970"/>
				<updated>2017-03-16T14:14:02Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== The electromagnetic spectrum ==&lt;br /&gt;
The electromagnetic spectrum or electric radio spectrum is not something material, but the space that is in the air that goes from the ground to the highest part of the sky. In this space, bands frequencies through which airplanes, wi-fi, bluetooth, walkie talkies, radios, telephones communicate are organized. The fact that our phones can be 2G, 3G, 4G means that they are using different bands of the electromagnetic space, through which the information circulates.&lt;br /&gt;
&lt;br /&gt;
For more information about the electromagnetic space:&lt;br /&gt;
https://imagine.gsfc.nasa.gov/science/toolbox/emspectrum1.html&lt;br /&gt;
https://en.wikipedia.org/wiki/Electromagnetic_spectrum&lt;br /&gt;
&lt;br /&gt;
== What is a fake cell tower?==&lt;br /&gt;
Fake cell towers (also known as IMSI catcher) are devices designed to intercept the traffic of a mobile phone and track the movements of the user's phone &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IMSI-catcher &amp;lt;/ref&amp;gt; pretending to be a &amp;quot;legitimate&amp;quot; cell tower &amp;lt;ref&amp;gt;https://www.eff.org/sls/tech/cell-site-simulators &amp;lt;/ref&amp;gt;.&lt;br /&gt;
[[File:Imsi-catcher.png|thumb|none|alt=Esquema torre falsa.|Esquema de una torre falsa de celular (modificado de [http://cybernc.com/les-imsi-catchers/ Henri-Olivier]).]]&lt;br /&gt;
&lt;br /&gt;
By the way they work IMSI catcher are considered a &amp;quot;man in the middle&amp;quot; attack &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Man-in-the-middle_attack&amp;lt;/ref&amp;gt;. This is defined as an attack that acquires the ability to read, insert and modify at will, messages between two parties without any of them knowing that the link between them has been violated. The attacker should be able to observe and intercept messages between the two victims &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IntermediateAccess &amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There is evidence that such devices have been used for surveillance purposes, for example in Ukraine the mobile phones of those attending a large demonstration were tracked and then massively received a text message stating &amp;quot;Dear subscriber, you have been registered As a participant in a mass disturbance &amp;quot;&amp;lt;ref&amp;gt;https://antivigilancia.org/es/2015/06/la-vigilancia-y-la-protesta-social/ &amp;lt;/ref&amp;gt;. In Latin America, it is known that governments like Mexico and Colombia have bought such devices.&lt;br /&gt;
&lt;br /&gt;
Unfortunately fake cell towers are becoming easier to get and their price can be as low as $ 500. Depending on the model there is evidence that not only can intercept the traffic of a phone but also can also inject malware.&lt;br /&gt;
&lt;br /&gt;
'''Bold text'''==How to detect them? ==&lt;br /&gt;
&lt;br /&gt;
A first step would be to have a database of the &amp;quot;legitimate&amp;quot; cell towers and the list of legitimate companies that provide these services and have the necessary operating permits. There are some databases such as:  http://opencellid.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Opencell.png|thumbnail|center|Torres en en América Latina]]&lt;br /&gt;
&lt;br /&gt;
There is also information about the frequencies where they should operate:&lt;br /&gt;
http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
[[File:Frecuencia.png|thumbnail|center|63/5000&lt;br /&gt;
Example of frequencies in which cellular telephony can operate]]&lt;br /&gt;
&lt;br /&gt;
And you can have a look at the development of the GSM network:&lt;br /&gt;
 http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
There are also some applications that can be downloaded from the following free app repository:&lt;br /&gt;
F-Droid is a software repository (or &amp;quot;app store&amp;quot;) for Android applications, similar to the Google Play store. The main repository, hosted by the project, contains only apps which are free software. Applications can be browsed and installed from the F-Droid website or client app without the need to register for an account. &amp;quot;Anti-features&amp;quot; such as advertising, user tracking, or dependence on non-free software are flagged in app descriptions.[3] The website also offers the source code of applications it hosts as well as the software running the F-Droid server, allowing anyone to set up their own app repository.&lt;br /&gt;
&lt;br /&gt;
In order to detect possible false antennas, you can download from F-Droid the following applications:&lt;br /&gt;
&lt;br /&gt;
[http://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/ Android IMSI Catcher Detector]&lt;br /&gt;
&lt;br /&gt;
[[File:AIMSICD-Teaser.png|400px|thumbnail|center|AIMSICD]]&lt;br /&gt;
&lt;br /&gt;
Android IMSI Catcher Detector attempts to detect IMSI-Catchers through detection methods such as: Check Tower Information Consistency,   Check LAC/Cell ID Consistency, check Neighbouring Cell Info, prevent silent app installations, monitor Signal Strength, detect silent SMS and detect FemtoCells&lt;br /&gt;
&lt;br /&gt;
[https://opensource.srlabs.de/projects/snoopsnitch Snoopsnitch]&lt;br /&gt;
&lt;br /&gt;
[[File:Sc catcher hour.png|200px|thumbnail|center|Snoopsnitch]]&lt;br /&gt;
&lt;br /&gt;
SnoopSnitch is an Android app that collects and analyzes mobile radio data to make you aware of your mobile network security and to warn you about threats like fake base stations (IMSI catchers), user tracking and over-the-air updates. With SnoopSnitch you can use the data collected in the GSM Security Map at gsmmap.org and contribute your own data to GSM Map.  This application currently only works on Android phones with a Qualcomm chipset and a stock Android ROM (or a suitable custom ROM with Qualcomm DIAG driver). It requires root priviliges to capture mobile network data.&lt;br /&gt;
&lt;br /&gt;
== How to protect yourself from fake cell towers?==&lt;br /&gt;
&lt;br /&gt;
If your phone allows it you can change its configuration options so that it does not connect to all available cell towers. For example on an Android phone you can go to: Configuration &amp;gt;   Wireless and networks  &amp;gt; More configuration &amp;gt; Mobile networks and there you can change &amp;gt; Network preferences  GSM/UTMS for using 3G or 4G if your smart-phone allows it and also choose for &amp;gt; Network operators &amp;gt; Choosing manually the antennas to connect. &lt;br /&gt;
&lt;br /&gt;
You can also isolate your mobile using a Faraday phone pouch, please read this other tutorial on the topic &amp;lt;ref&amp;gt;https://gendersec.tacticaltech.org/wiki/index.php/Faraday_Phone_Pouch&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
-Tela_y_proceso_de_bolsa_por_killyourphone-com.jpg|Phone Pouch&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Where can I see more information?==&lt;br /&gt;
&lt;br /&gt;
http://wiki.labomedia.org/index.php/GSM&lt;br /&gt;
https://quematumovil.pimienta.org/los_imsi-catchers.html&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== The electromagnetic spectrum ==&lt;br /&gt;
The electromagnetic spectrum or electric radio spectrum is not something material, but the air space that goes from the ground to the highest part of the atmosphere. In this space, frequency bands are organized, through which airplanes, wi-fi, bluetooth, walkie talkies, radios, telephones communicate, for example 2G, 3G, 4G phone networks use different bands of the electromagnetic space, through which data is transmitted. &lt;br /&gt;
&lt;br /&gt;
For more information about the electromagnetic space:&lt;br /&gt;
https://imagine.gsfc.nasa.gov/science/toolbox/emspectrum1.html&lt;br /&gt;
https://en.wikipedia.org/wiki/Electromagnetic_spectrum&lt;br /&gt;
&lt;br /&gt;
== What is a fake cell tower?==&lt;br /&gt;
Fake cell towers (also known as IMSI catchers) are devices designed to intercept the traffic of a mobile phone and track the movements of the user's phone &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IMSI-catcher &amp;lt;/ref&amp;gt; pretending to be a &amp;quot;legitimate&amp;quot; cell tower &amp;lt;ref&amp;gt;https://www.eff.org/sls/tech/cell-site-simulators &amp;lt;/ref&amp;gt;.&lt;br /&gt;
[[File:Imsi-catcher.png|thumb|none|alt=Esquema torre falsa.|Esquema de una torre falsa de celular (modificado de [http://cybernc.com/les-imsi-catchers/ Henri-Olivier]).]]&lt;br /&gt;
&lt;br /&gt;
From the way they work IMSI catchers are considered to execute &amp;quot;man in the middle&amp;quot; attacks &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Man-in-the-middle_attack&amp;lt;/ref&amp;gt;. This is defined as an attack that acquires the ability to read, insert and modify at will, messages between two parties without either of them knowing that the link between them has been compromised. The attacker should be able to observe and intercept messages between the two victims &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IntermediateAccess &amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There is evidence that such devices have been used for surveillance purposes, for example in Ukraine the mobile phones of those attending a large demonstration were tracked and then received a mass text message stating: &amp;quot;Dear subscriber, you have been registered As a participant in a mass disturbance &amp;quot;&amp;lt;ref&amp;gt;https://antivigilancia.org/es/2015/06/la-vigilancia-y-la-protesta-social/ &amp;lt;/ref&amp;gt;. In Latin America, it is known that governments, such as Mexico and Colombia, have bought such devices.&lt;br /&gt;
&lt;br /&gt;
Unfortunately fake cell towers are becoming easier to get and their price can be as low as 500 USD. Depending on the model there is evidence that IMSI catchers can not only can intercept phone traffic, but also can also inject malware.&lt;br /&gt;
&lt;br /&gt;
'''Bold text'''==How to detect them? ==&lt;br /&gt;
&lt;br /&gt;
A first step is to have a database of the &amp;quot;legitimate&amp;quot; cell towers and the list of legitimate companies that provide these services with the necessary operating permits. Some of these databases exist, such as:  http://opencellid.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Opencell.png|thumbnail|center|Torres en en América Latina]]&lt;br /&gt;
&lt;br /&gt;
There is also information available about the frequencies on which they should operate:&lt;br /&gt;
http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
[[File:Frecuencia.png|thumbnail|center|63/5000&lt;br /&gt;
Example of frequencies on which cellular networks can operate]]&lt;br /&gt;
&lt;br /&gt;
And you can have a look at the development of the GSM network:&lt;br /&gt;
 http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
There are also some applications that can be downloaded from the following free app repository:&lt;br /&gt;
F-Droid is a software repository (or &amp;quot;app store&amp;quot;) for Android applications, similar to the Google Play store. The main repository, hosted by the project, contains only apps which are free software. Applications can be browsed and installed from the F-Droid website or client app without the need to register for an account. &amp;quot;Anti-features&amp;quot; such as advertising, user tracking, or dependence on non-free software are flagged in app descriptions.[3] The website also offers the source code of applications it hosts as well as the software running the F-Droid server, allowing anyone to set up their own app repository.&lt;br /&gt;
&lt;br /&gt;
In order to detect possible false antennas, you can download from F-Droid the following applications:&lt;br /&gt;
&lt;br /&gt;
[http://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/ Android IMSI Catcher Detector]&lt;br /&gt;
&lt;br /&gt;
[[File:AIMSICD-Teaser.png|400px|thumbnail|center|AIMSICD]]&lt;br /&gt;
&lt;br /&gt;
Android IMSI Catcher Detector attempts to detect IMSI-Catchers through detection methods such as: Check Tower Information Consistency,   Check LAC/Cell ID Consistency, check neighbouring cell info, prevent silent app installations, monitor Signal Strength, detect silent SMS and detect FemtoCells&lt;br /&gt;
&lt;br /&gt;
[https://opensource.srlabs.de/projects/snoopsnitch Snoopsnitch]&lt;br /&gt;
&lt;br /&gt;
[[File:Sc catcher hour.png|200px|thumbnail|center|Snoopsnitch]]&lt;br /&gt;
&lt;br /&gt;
SnoopSnitch is an Android app that collects and analyzes mobile radio data to make you aware of your mobile network security and to warn you about threats such as fake base stations (IMSI catchers), user tracking and over-the-air updates. With SnoopSnitch you can use the data collected in the GSM Security Map at gsmmap.org and contribute your own data to GSM Map.  This application currently only works on Android phones with a Qualcomm chipset and a stock Android ROM (or a suitable custom ROM with Qualcomm DIAG driver). It requires root priviliges to capture mobile network data.&lt;br /&gt;
&lt;br /&gt;
== How to protect yourself from fake cell towers?==&lt;br /&gt;
&lt;br /&gt;
If your phone allows it you can change its configuration options so that it does not connect to all available cell towers. For example on an Android phone you can go to: Configuration &amp;gt;   Wireless and networks  &amp;gt; More configuration &amp;gt; Mobile networks and there you can change &amp;gt; Network preferences  GSM/UTMS for using 3G or 4G if your smart-phone allows it and also choose for &amp;gt; Network operators &amp;gt; Choosing manually the antennas to connect. &lt;br /&gt;
&lt;br /&gt;
You can also isolate your mobile using a Faraday phone pouch, please read this other tutorial on the topic &amp;lt;ref&amp;gt;https://gendersec.tacticaltech.org/wiki/index.php/Faraday_Phone_Pouch&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
-Tela_y_proceso_de_bolsa_por_killyourphone-com.jpg|Phone Pouch&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Where can I see more information?==&lt;br /&gt;
&lt;br /&gt;
http://wiki.labomedia.org/index.php/GSM&lt;br /&gt;
https://quematumovil.pimienta.org/los_imsi-catchers.html&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== The electromagnetic spectrum ==&lt;br /&gt;
The electromagnetic spectrum or electric radio spectrum is not something material, but the air space that goes from the ground to the highest part of the atmosphere. In this space, frequency bands are organized, through which airplanes, wi-fi, bluetooth, walkie talkies, radios, telephones communicate, for example 2G, 3G, 4G phone networks use different bands of the electromagnetic space, through which data is transmitted. &lt;br /&gt;
&lt;br /&gt;
For more information about the electromagnetic space:&lt;br /&gt;
https://imagine.gsfc.nasa.gov/science/toolbox/emspectrum1.html&lt;br /&gt;
https://en.wikipedia.org/wiki/Electromagnetic_spectrum&lt;br /&gt;
&lt;br /&gt;
== What is a fake cell tower?==&lt;br /&gt;
Fake cell towers (also known as IMSI catchers) are devices designed to intercept the traffic of a mobile phone and track the movements of the user's phone &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IMSI-catcher &amp;lt;/ref&amp;gt; pretending to be a &amp;quot;legitimate&amp;quot; cell tower &amp;lt;ref&amp;gt;https://www.eff.org/sls/tech/cell-site-simulators &amp;lt;/ref&amp;gt;.&lt;br /&gt;
[[File:Imsi-catcher.png|thumb|none|alt=Esquema torre falsa.|Esquema de una torre falsa de celular (modificado de [http://cybernc.com/les-imsi-catchers/ Henri-Olivier]).]]&lt;br /&gt;
&lt;br /&gt;
From the way they work IMSI catchers are considered to execute &amp;quot;man in the middle&amp;quot; attacks &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Man-in-the-middle_attack&amp;lt;/ref&amp;gt;. This is defined as an attack that acquires the ability to read, insert and modify at will, messages between two parties without either of them knowing that the link between them has been compromised. The attacker should be able to observe and intercept messages between the two victims &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IntermediateAccess &amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There is evidence that such devices have been used for surveillance purposes, for example in Ukraine the mobile phones of those attending a large demonstration were tracked and then received a mass text message stating: &amp;quot;Dear subscriber, you have been registered As a participant in a mass disturbance &amp;quot;&amp;lt;ref&amp;gt;https://antivigilancia.org/es/2015/06/la-vigilancia-y-la-protesta-social/ &amp;lt;/ref&amp;gt;. In Latin America, it is known that governments, such as Mexico and Colombia, have bought such devices.&lt;br /&gt;
&lt;br /&gt;
Unfortunately fake cell towers are becoming easier to get and their price can be as low as 500 USD. Depending on the model there is evidence that IMSI catchers can not only can intercept phone traffic, but also can also inject malware.&lt;br /&gt;
&lt;br /&gt;
'''Bold text'''==How to detect them? ==&lt;br /&gt;
&lt;br /&gt;
A first step is to have a database of the &amp;quot;legitimate&amp;quot; cell towers and the list of legitimate companies that provide these services with the necessary operating permits. Some of these databases exist, such as:  http://opencellid.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Opencell.png|thumbnail|center|Torres en en América Latina]]&lt;br /&gt;
&lt;br /&gt;
There is also information available about the frequencies on which they should operate:&lt;br /&gt;
http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
[[File:Frecuencia.png|thumbnail|center|63/5000&lt;br /&gt;
Example of frequencies on which cellular networks can operate]]&lt;br /&gt;
&lt;br /&gt;
And you can have a look at the development of the GSM network:&lt;br /&gt;
 http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
There are also some applications that can be downloaded from the following free app repository:&lt;br /&gt;
F-Droid is a software repository (or &amp;quot;app store&amp;quot;) for Android applications, similar to the Google Play store. The main repository, hosted by the project, contains only apps which are free software. Applications can be browsed and installed from the F-Droid website or client app without the need to register for an account. &amp;quot;Anti-features&amp;quot; such as advertising, user tracking, or dependence on non-free software are flagged in app descriptions.[3] The website also offers the source code of applications it hosts as well as the software running the F-Droid server, allowing anyone to set up their own app repository.&lt;br /&gt;
&lt;br /&gt;
In order to detect possible false antennas, you can download from F-Droid the following applications:&lt;br /&gt;
&lt;br /&gt;
[http://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/ Android IMSI Catcher Detector]&lt;br /&gt;
&lt;br /&gt;
[[File:AIMSICD-Teaser.png|400px|thumbnail|center|AIMSICD]]&lt;br /&gt;
&lt;br /&gt;
Android IMSI Catcher Detector attempts to detect IMSI-Catchers through detection methods such as: Check Tower Information Consistency,   Check LAC/Cell ID Consistency, check neighbouring cell info, prevent silent app installations, monitor Signal Strength, detect silent SMS and detect FemtoCells&lt;br /&gt;
&lt;br /&gt;
[https://opensource.srlabs.de/projects/snoopsnitch Snoopsnitch]&lt;br /&gt;
&lt;br /&gt;
[[File:Sc catcher hour.png|200px|thumbnail|center|Snoopsnitch]]&lt;br /&gt;
&lt;br /&gt;
SnoopSnitch is an Android app that collects and analyzes mobile radio data to make you aware of your mobile network security and to warn you about threats such as fake base stations (IMSI catchers), user tracking and over-the-air updates. With SnoopSnitch you can use the data collected in the GSM Security Map at gsmmap.org and contribute your own data to GSM Map.  This application currently only works on Android phones with a Qualcomm chipset and a stock Android ROM (or a suitable custom ROM with Qualcomm DIAG driver). It requires root priviliges to capture mobile network data.&lt;br /&gt;
&lt;br /&gt;
== How to protect yourself from fake cell towers?==&lt;br /&gt;
&lt;br /&gt;
If your phone allows it you can change its configuration options so that it does not connect to all available cell towers. For example on an Android phone you can go to: Configuration &amp;gt;   Wireless and networks  &amp;gt; More configuration &amp;gt; Mobile networks and there you can change &amp;gt; Network preferences  GSM/UTMS for using 3G or 4G if your smart-phone allows it and also choose for &amp;gt; Network operators &amp;gt; Choosing manually the antennas to connect. &lt;br /&gt;
&lt;br /&gt;
You can also isolate your mobile using a Faraday phone pouch, please read this other tutorial on the topic &amp;lt;ref&amp;gt;https://gendersec.tacticaltech.org/wiki/index.php/Faraday_Phone_Pouch&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
-Tela_y_proceso_de_bolsa_por_killyourphone-com.jpg|Phone Pouch&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Where can I see more information?==&lt;br /&gt;
&lt;br /&gt;
http://wiki.labomedia.org/index.php/GSM&lt;br /&gt;
https://quematumovil.pimienta.org/los_imsi-catchers.html&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Install_party_free_software_vs_gender_codes&amp;diff=8969</id>
		<title>Install party free software vs gender codes</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Install_party_free_software_vs_gender_codes&amp;diff=8969"/>
				<updated>2017-03-16T14:10:31Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Install party free software vs gender codes&lt;br /&gt;
|Kind of learning session=Gender and Tech&lt;br /&gt;
|Tutorial category=Icebreaking, Discussion&lt;br /&gt;
|Duration (hours)=1-2&lt;br /&gt;
|Learning objectives=- Increase the philosophical and political understanding of free software&lt;br /&gt;
&lt;br /&gt;
- Understand and think about the possible parallels between free software and feminism / radical gender policies&lt;br /&gt;
&lt;br /&gt;
- Learning and sharing concepts around gender&lt;br /&gt;
&lt;br /&gt;
- Meet within a group&lt;br /&gt;
&lt;br /&gt;
- Create a live P2P system&lt;br /&gt;
|Prerequisites=No prerequisite,  the exercise is structured as a way to expand understanding of free software. This activity is good for a new in order to better know each other.&lt;br /&gt;
|Methodology=1) First briefly introduce what is an install party and P2P systems to share data (not mediated by a centralizing server). Ask if participants in the room can explain those concepts with their own words. Then  describe parallels between proprietary software systems where the code is closed and can not be reviewed and modified and heterosexual sex-gender systems (we know how they work but we can not easily change them).&lt;br /&gt;
&lt;br /&gt;
Brief discussion. (10 minutes)&lt;br /&gt;
&lt;br /&gt;
2) Start the install party. Each person writes in post-it's (or in a usb scheme, see document attached)  concepts that have to do with gender, feminism, sexual dissidence, sexuality, or any specific knowledge/skills they can share with another person. A copy of these post-it's / identifiers are listed in a  wall and another on their body. On the other hand every person write a concept, situation, habit they want to remove or un-install (for instance patriarchy, sexism, transphobia etc) . They also stick one copy on their body and another one on the wall. (10 minutes)&lt;br /&gt;
&lt;br /&gt;
Give time to the group to review the different concepts (installing and un-installing) of the wall. Check for repetitions and unify/cluster concepts. (10 minutes)&lt;br /&gt;
&lt;br /&gt;
3) The installation begins. The group has to be divided into two parts, one will be the first &amp;quot;installers&amp;quot; and another of those who will be &amp;quot;installed&amp;quot;. The &amp;quot;installed&amp;quot; group is individually choosing a concept they wish to install /learn and will have to look for the person who has that sign in their body. Every person meet their installer and share information for 5 minutes around that concept. After these 5 minutes the &amp;quot;installed&amp;quot; person can already become &amp;quot;installer&amp;quot; of that concept to other persons, placing the iconographic (or post-it) sign on his body.&lt;br /&gt;
&lt;br /&gt;
It is possible that during the installation several people want to install the same concept at the same time, in that case, they will be able to joining in group where the &amp;quot;installer&amp;quot;  can make a more collective transference.&lt;br /&gt;
&lt;br /&gt;
The dynamic is free and organic, the group accommodates to its own pace.&lt;br /&gt;
&lt;br /&gt;
Although at the beginning it seeks to collect new concepts, it is also interesting to receive concepts that one already knows to learn new edges of it. The installation becomes a situation of exchange, amplification of the understandings and practical experience around the freedoms of free software applied to gender codes.&lt;br /&gt;
&lt;br /&gt;
This dynamic can be extended for about 40-60 minutes.&lt;br /&gt;
&lt;br /&gt;
Finally, a round of evaluation, impressions, learning takes place (10 minutes)&lt;br /&gt;
|Number of facilitators involved=1-2 depending of the size of the group&lt;br /&gt;
|Technical needs=- Post-it's many colours / usb's printed graphs&lt;br /&gt;
&lt;br /&gt;
- Pens or pencils&lt;br /&gt;
&lt;br /&gt;
- You can have a list of concepts previously to suggest (although it would be very strange that they did not emerge naturally). For example: heterosexual; LGTIQ, Sex-gender system; trans, intersexuality, transhackfeminism;,cyberfeminism, gender system, heteronormativity, gender technologies, queer; sexual dissidences, privilege, gender performances, violence, ecosexuality, subversive, dildo, postpornography, tomboy, drag king, sexual work, etc&lt;br /&gt;
|Theoretical and on line resources=One example in Spanish: http://medialab-prado.es/article/install_party_de_conceptos_p2p_degenerado&lt;br /&gt;
&lt;br /&gt;
Install Party definition: https://en.wikipedia.org/wiki/Linux_user_group#Installfests&lt;br /&gt;
&lt;br /&gt;
P2P definition: https://en.wikipedia.org/wiki/Peer-to-peer&lt;br /&gt;
&lt;br /&gt;
[[File:Usbs.pdf]]&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Tutorial&lt;br /&gt;
|Title of the tutorial=Install party free software vs gender codes&lt;br /&gt;
|Kind of learning session=Gender and Tech&lt;br /&gt;
|Tutorial category=Icebreaking, Discussion&lt;br /&gt;
|Duration (hours)=1-2&lt;br /&gt;
|Learning objectives=- Increase the philosophical and political understanding of free software&lt;br /&gt;
&lt;br /&gt;
- Understand and think about the possible parallels between free software and feminism / radical gender policies&lt;br /&gt;
&lt;br /&gt;
- Learning and sharing concepts around gender&lt;br /&gt;
&lt;br /&gt;
- Meet within a group&lt;br /&gt;
&lt;br /&gt;
- Create a live P2P system&lt;br /&gt;
|Prerequisites=No prerequisite,  the exercise is structured as a way to increase understanding of free software. This activity is good for a new group in order to better know each other.&lt;br /&gt;
|Methodology=1) First briefly explain what an install party is and also epxlain P2P systems to share data (i.e. not mediated by a central server). Ask if participants in the room can explain those concepts with their own words. Then  describe parallels between proprietary software systems where the code is closed and cannot be reviewed and modified and heterosexual sex-gender systems (we know how they work but we can not easily change them).&lt;br /&gt;
&lt;br /&gt;
Brief discussion. (10 minutes)&lt;br /&gt;
&lt;br /&gt;
2) Start the install party. Each person writes in post-its (or in a usb scheme, see document attached)  concepts that have to do with gender, feminism, sexual dissidence, sexuality, or any specific knowledge/skills they can share with another person. One copy of these post-its / identifiers is posted on a  wall and another on their body. After that every person writes a concept, situation, habit they want to remove or &amp;quot;un-install&amp;quot; (for instance patriarchy, sexism, transphobia etc) . They also stick one copy on their body and another one on the wall. (10 minutes)&lt;br /&gt;
&lt;br /&gt;
Give the group time to review the different concepts (installing and un-installing) on the wall. Check for repetitions and unify/cluster concepts. (10 minutes)&lt;br /&gt;
&lt;br /&gt;
3) The installation begins. The group has to be divided into two parts, one will be the first &amp;quot;installers&amp;quot; and the other group will be &amp;quot;installed&amp;quot;. The &amp;quot;installed&amp;quot; group is individually choosing a concept they wish to install /learn and will have to look for the person who has that post it note on their body. Every person form the &amp;quot;installed&amp;quot; group then talks to their &amp;quot;installer&amp;quot; for 5 minutes. After these 5 minutes the &amp;quot;installed&amp;quot; person can already become &amp;quot;installer&amp;quot; of that concept to other persons, placing the post-it sign on their body.&lt;br /&gt;
&lt;br /&gt;
It is possible that during the installation several people want to install the same concept at the same time, in that case, they will be able to form a group where the &amp;quot;installer&amp;quot; can do a collective installation.&lt;br /&gt;
&lt;br /&gt;
The dynamic is free and organic, the group adjusts to its own pace.&lt;br /&gt;
&lt;br /&gt;
Although initially this exercise is about finding out about new concepts, but it is also interesting to find new edges  and perspective to concepts already known. The installation becomes an opporuntity to exchange and amplify the understandings and practical experience around the freedoms of free software applied to gender codes.&lt;br /&gt;
&lt;br /&gt;
This exercise can be extended for about 40-60 minutes.&lt;br /&gt;
&lt;br /&gt;
Finally, a round of evaluation, impressions, learning takes place (10 minutes)&lt;br /&gt;
|Number of facilitators involved=1-2 depending of the size of the group&lt;br /&gt;
|Requirements=- Post-it's many colours / usb's printed graphs&lt;br /&gt;
&lt;br /&gt;
- Pens or pencils&lt;br /&gt;
&lt;br /&gt;
- You can have a list of concepts previously suggested (although it would be very strange that they did not emerge naturally). For example: heterosexual; LGTIQ, Sex-gender system; trans, intersexuality, transhackfeminism;,cyberfeminism, gender system, heteronormativity, gender technologies, queer; sexual dissidences, privilege, gender performances, violence, ecosexuality, subversive, dildo, postpornography, tomboy, drag king, sexual work, etc&lt;br /&gt;
|Theoretical and on line resources=One example in Spanish: http://medialab-prado.es/article/install_party_de_conceptos_p2p_degenerado&lt;br /&gt;
&lt;br /&gt;
Install Party definition: https://en.wikipedia.org/wiki/Linux_user_group#Installfests&lt;br /&gt;
&lt;br /&gt;
P2P definition: https://en.wikipedia.org/wiki/Peer-to-peer&lt;br /&gt;
&lt;br /&gt;
[[File:Usbs.pdf]]&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Self_care,_Emotions&amp;diff=8968</id>
		<title>Self care, Emotions</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Self_care,_Emotions&amp;diff=8968"/>
				<updated>2017-03-16T14:09:32Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Self care, Emotions&lt;br /&gt;
|Kind of learning session=Holistic&lt;br /&gt;
|Tutorial category=Icebreaking, Energiser&lt;br /&gt;
|Duration (hours)=45 mins&lt;br /&gt;
|Learning objectives=Download emotions accumulated during the day and acquire tools to work emotions (in particular anxiety) both personally and collectively&lt;br /&gt;
|Methodology=For a few minutes, we danced together to the sound of relaxing drums because, as Emma Goldman, Jane Barry and Jelena Dordevic put it: What good is revolution, if we can not dance?&lt;br /&gt;
&lt;br /&gt;
Exercise 1. Embrace Fingers&lt;br /&gt;
&lt;br /&gt;
We listen to a didactic radio capsule.&lt;br /&gt;
&lt;br /&gt;
Summary:&lt;br /&gt;
&lt;br /&gt;
When you feel a strong emotion, embrace your finger with the other hand and hold it for 2-5 minutes until the level of emotion drops. For each finger there is a connection of energy that corresponds to an emotion as shown in the following way:&lt;br /&gt;
&lt;br /&gt;
Thumb: is for tears, pain and emotional pain. Holding fingers does not prevent tears or pain, but allows the energy to move until the person calms down. Grab your thumb, breathe deeply and exhale the pain and sorrow you feel. Hold your finger until you feel a pulse of energy.&lt;br /&gt;
&lt;br /&gt;
Index: it is for fear, it is important to listen to the fear as one would hear a guide. Fear can tell us many things about your environment, our physical well-being and our growth. It is what we do with fear that is important. If you are afraid, instead of paralysing, grab your index finger to make a wise decision in the situation - run away, stay or react. With traumatic stress a person can continuously panic in their body-spirit. Using the index finger is a good way to learn how to work with fear, rather than being a victim of fear. As you hold your index finger, exhale and let go of fear, and inhale courage and strength to be.&lt;br /&gt;
&lt;br /&gt;
Medium: is for anger and rage. Anger is a natural and normal emotion in many situations. Fury can result in violence toward others or toward ourselves. Suppressed anger or denial of our own depths of fury can result in passive-aggressive behavior or many physical symptoms in the body that include arthritis, ulcers, migraines, and knots in the muscles of various parts of the body. Hold your middle finger, exhale and let go of all the fury and anger, inhale energy and creative passion in your being.&lt;br /&gt;
&lt;br /&gt;
Override: is for anxiety and nervousness. As many people unconsciously play with their ringtones when they are afflicted and annoyed by the constant mental noise. Annulment helps to discharge unnecessary distress and anxiety, saving energy for action. Take a deep breath and grab your ring. Exhale, letting go of all the worries and anxiety. Inhale with a deep sense of peace and security amid the problems of life, knowing that you are spiritually backed and cared for&lt;br /&gt;
&lt;br /&gt;
Little finger: it is for self-esteem when one feels victimized by circumstances. Holding the little finger is a way to control feelings of unworthiness and low self-esteem. To stop feeling like a victim, it is important to first recognize what you get when you feel that way - attention, hurt, the concern of others. Placing yourself in a state of power and self-esteem gives you many rewards and a true sense of appreciation in the eyes of others. Hold your little finger, breathe deeply, exhale and let go of insecurity and lack of self-esteem.&lt;br /&gt;
&lt;br /&gt;
Exercises: 2. Download Anxiety&lt;br /&gt;
&lt;br /&gt;
Emotional release techniques are very useful to unlock and heal strong emotions, fears, anxiety, emotional pain, anger, traumatic memories, phobias and addictions, as well as to alleviate pain symptoms such as headache or body pain. .&lt;br /&gt;
&lt;br /&gt;
The technique is based on the theory of the energy field of the body, mind and spirit, together with the meridian theory of oriental medicine. Problems, traumas, anxiety and pain can cause a blockage in the travel of energy in the body. Tapping or acupressure at the points connected to the energy channels or meridians can help unlock the congested energy and promote a fluid or healthy travel of energy in the body and in the mental field.&lt;br /&gt;
&lt;br /&gt;
Steps:&lt;br /&gt;
&lt;br /&gt;
    Sit very comfortable without crossing feet&lt;br /&gt;
    Think of a problem that can be used to measure your level of anxiety: Choose to work on a problem, a concern, a phobia, an anxiety, a traumatic memory, or some negative thinking.&lt;br /&gt;
    Using a scale of 0 to 10 measures the level of anxiety you feel when you think about it. (0 = no anxiety and 10 = maximum anxiety level).&lt;br /&gt;
    Give 7 or 9 taps to the identified acupressure points below&lt;br /&gt;
    Breathe deeply as you tap the fingers with your index and middle fingers at the indicated points:&lt;br /&gt;
&lt;br /&gt;
1. The points where the eyebrows begin 2. The points where the eyebrows end 3. The points on the cheekbones, under the pupils 4. The point under the nose 5. The point on the chin, under the lips 6. The points about 10cm below the armpits 7. The points below the clavicles by the sternum.&lt;br /&gt;
&lt;br /&gt;
    Touch the dot next to her hand and repeat 3 times: &amp;quot;Even though I have this problem, I'm fine, and I work it!&amp;quot;&lt;br /&gt;
    Repeat the sequence presented in points 2 and 3:&lt;br /&gt;
    Repeat this sequence until your anxiety level has dropped to 0-2&lt;br /&gt;
    Give a gentle massage on the &amp;quot;sore spot&amp;quot; that lies on the left side of the chest, about 5cm below the left side of the clavicle and 4 or 5cm next to the sternum.&lt;br /&gt;
|Number of facilitators involved=1 or 2&lt;br /&gt;
|Technical needs=Relaxing area, cushions; sound system&lt;br /&gt;
|Theoretical and on line resources=Mãozada − The Handshake manual:&lt;br /&gt;
https://hackingwithcare.in/wiki/doku.php/maozada https://hackingwithcare.in/wiki/lib/exe/fetch.php/maozada_hackingwithcare_handsmassage_manual.pdf&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Tutorial&lt;br /&gt;
|Title of the tutorial=Self care, Emotions&lt;br /&gt;
|Kind of learning session=Holistic&lt;br /&gt;
|Tutorial category=Icebreaking, Energiser&lt;br /&gt;
|Duration (hours)=45 mins&lt;br /&gt;
|Learning objectives=Download emotions accumulated during the day and acquire tools to work emotions (in particular anxiety) both personally and collectively&lt;br /&gt;
|Methodology=For a few minutes, we danced together to the sound of relaxing drums because, as Emma Goldman, Jane Barry and Jelena Dordevic put it: What good is revolution, if we can not dance?&lt;br /&gt;
&lt;br /&gt;
Exercise 1. Embrace Fingers&lt;br /&gt;
&lt;br /&gt;
We listen to an audio file.&lt;br /&gt;
&lt;br /&gt;
Summary:&lt;br /&gt;
&lt;br /&gt;
When you feel a strong emotion, grasp your fingers on one hand with the other hand and hold for 2-5 minutes until the level of emotion drops. For each finger there is a connection of energy that corresponds to an emotion:&lt;br /&gt;
&lt;br /&gt;
Thumb: is for tears, pain and emotional pain. Holding fingers does not prevent tears or pain, but allows the energy to move until the person calms down. Grab your thumb, breathe deeply and exhale the pain and sorrow you feel. Hold your thumb until you feel a pulse of energy.&lt;br /&gt;
&lt;br /&gt;
Index: is for fear - it is important to listen to the fear as one would hear a guide. Fear can tell us many things about our environment, our physical well-being and our growth. It is what we do with fear that is important. If you are afraid, instead of feeling paralysed, grab your index finger to make a good decision in the situation - run away, stay or react. With traumatic stress a person can feel trapped in a spiral of mental and physical panic. Using the index finger is a good way to learn how to work with fear, rather than be a victim of fear. As you hold your index finger, exhale and let go of fear, and inhale courage and strength.&lt;br /&gt;
&lt;br /&gt;
Medium: is for anger and rage. Anger is a natural and normal emotion in many situations. Fury can result in violence toward others or toward ourselves. Suppressed anger or denial of our own depths of fury can result in passive-aggressive behavior or many physical symptoms in the body, including arthritis, ulcers, migraines, and knots in the muscles of various parts of the body. Hold your middle finger, exhale and let go of all the fury and anger, inhale energy and creative passion in your being.&lt;br /&gt;
&lt;br /&gt;
Override: is for anxiety and nervousness, such as when people unconsciously play with their ringtones when they are afflicted and annoyed by the constant mental noise around them. Annulment helps to discharge unnecessary distress and anxiety, saving energy for action. Take a deep breath and grab your ring finger. Exhale, letting go of all the worries and anxiety. Inhale with a deep sense of peace and security amid the problems of life, knowing that you are spiritually supported and cared for.&lt;br /&gt;
&lt;br /&gt;
Little finger: is for self-esteem when one feels victimized by circumstances. Holding the little finger is a way to control feelings of unworthiness and low self-esteem. To stop feeling like a victim, it is important to first recognize what you get when you feel that way - attention, hurt, the concern of others. Placing yourself in a state of power and self-esteem gives you many rewards and a true sense of appreciation in the eyes of others. Hold your little finger, breathe deeply, exhale and let go of insecurity and low self-esteem.&lt;br /&gt;
&lt;br /&gt;
Exercises: 2. Download Anxiety&lt;br /&gt;
&lt;br /&gt;
Emotional release techniques are very useful to unlock and heal strong negative emotions; fears, anxiety, emotional pain, anger, traumatic memories, phobias and addictions, as well as to alleviate pain symptoms such as headache or body pain.&lt;br /&gt;
&lt;br /&gt;
The technique is based on the theory of the energy field of the body, mind and spirit, together with the meridian theory of oriental medicine. Problems, traumas, anxiety and pain can cause a blockage in the travel of energy in the body. Tapping or acupressure at the points connected to the energy channels or meridians can help unlock the congested energy and promote a fluid or healthy flow of energy in the body and mind.&lt;br /&gt;
&lt;br /&gt;
Steps:&lt;br /&gt;
&lt;br /&gt;
    Sit very comfortably without crossing feet&lt;br /&gt;
    Think of a problem that can be used to measure your level of anxiety: Choose to work on a problem, a concern, a phobia, an anxiety, a traumatic memory, or some negative thinking.&lt;br /&gt;
    Using a scale of 0 to 10 measure the level of anxiety you feel when you think about it. (0 = no anxiety and 10 = maximum anxiety level).&lt;br /&gt;
    Give 7 or 9 taps to the acupressure points identified below&lt;br /&gt;
    Breathe deeply as you tap the fingers with your index and middle fingers at these points:&lt;br /&gt;
&lt;br /&gt;
1. The points where the eyebrows begin 2. The points where the eyebrows end 3. The points on the cheekbones, under the pupils 4. The point under the nose 5. The point on the chin, under the lips 6. The points about 10cm below the armpits 7. The points below the clavicle (collar bone) by the sternum.&lt;br /&gt;
&lt;br /&gt;
    Touch the dot next to your hand and repeat 3 times: &amp;quot;Even though I have this problem, I'm fine, and I work it!&amp;quot;&lt;br /&gt;
    Repeat the sequence presented in points 2 and 3:&lt;br /&gt;
    Repeat this sequence until your anxiety level has dropped to 0-2&lt;br /&gt;
    Give a gentle massage on the &amp;quot;sore spot&amp;quot; that lies on the left side of the chest, about 5cm below the left side of the clavicle (collar bone) and 4 or 5cm along from the sternum.&lt;br /&gt;
|Number of facilitators involved=1 or 2&lt;br /&gt;
|Technical needs=Relaxing area, cushions; sound system&lt;br /&gt;
|Theoretical and on line resources=Mãozada − The Handshake manual:&lt;br /&gt;
https://hackingwithcare.in/wiki/doku.php/maozada https://hackingwithcare.in/wiki/lib/exe/fetch.php/maozada_hackingwithcare_handsmassage_manual.pdf&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Self_care,_Body&amp;diff=8967</id>
		<title>Self care, Body</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Self_care,_Body&amp;diff=8967"/>
				<updated>2017-03-16T14:08:24Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Self care, Body&lt;br /&gt;
|Kind of learning session=Holistic&lt;br /&gt;
|Tutorial category=Icebreaking, Energiser&lt;br /&gt;
|Duration (hours)=45 mins&lt;br /&gt;
|Learning objectives=Connect with the body and release physical stress accumulated these days&lt;br /&gt;
|Methodology='''Exercises 1'''&lt;br /&gt;
&lt;br /&gt;
Various stretching and tension exercises on hands / back / arms&lt;br /&gt;
The explanatory video can be found at the following link: https://archive.org/details/BOOTSEQUENCE&lt;br /&gt;
&lt;br /&gt;
'''Exercises: 2'''&lt;br /&gt;
&lt;br /&gt;
Rest your eyes&lt;br /&gt;
&lt;br /&gt;
Closing our eyes we perform an exercise to concentrate and rest our eyes. Women activists who work for a long time in the computer often suffer from sleep disorders, concentration and / or seen by over-exposure to computer screens. This exercise helps to lower latency and affectation in the eyes.&lt;br /&gt;
 &lt;br /&gt;
With our eyes closed, in a guided meditation, we are walking with our eyes an imaginary clock:&lt;br /&gt;
1. First we walk the clock starting with point 12, going to point 3, point 6, point 9 and we return to point 12. We stop one minute for each point, Repeat the exercise twice&lt;br /&gt;
2. Now we go through the clock and stop at all the numbers on the clock: we start at 12 and we run: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11 and back to 12. We stop Minute for each point.&lt;br /&gt;
3. We remain silent for two minutes with our eyes closed and we gently open our eyes.&lt;br /&gt;
&lt;br /&gt;
'' 'Exercises: 3. Release tensions in the neck and back' ''&lt;br /&gt;
&lt;br /&gt;
Based on the technique of acupressure, we are going to help that the energy accumulated in the back and neck flow, we will press lightly with our index finger acupressure points.&lt;br /&gt;
 &lt;br /&gt;
Through this technique is made a direct connection with the energy of another person, therefore it is necessary to be very focused, calm and aware that we will share our energy with our partner.&lt;br /&gt;
Before we begin, we have to concentrate with a small two-minute meditation with our eyes closed, this is also the time to protect ourselves.&lt;br /&gt;
 &lt;br /&gt;
Steps&lt;br /&gt;
 &lt;br /&gt;
1. Lightly press with your index fingers the points located on the dimple next to the shoulder blades.&lt;br /&gt;
2. Press lightly with your index fingers the points located at the base of the neck&lt;br /&gt;
3. Press lightly with your index fingers the points located in the neck just below where the neck begins&lt;br /&gt;
4. After releasing energy, the people who worked together are thankful ..&lt;br /&gt;
  &lt;br /&gt;
'' 'Discussion: What did I notice? What did I build and need?&lt;br /&gt;
&lt;br /&gt;
We shared the different emotions with which we connected the exercises. Several companions were able to release emotions they could not connect with years ago. We closed by thanking each other for their trust and we share some happy moment together.&lt;br /&gt;
|Number of facilitators involved=1 or 2&lt;br /&gt;
|Technical needs=relaxing area, cushions, sound system&lt;br /&gt;
|Theoretical and on line resources=Bootsequence from Hacking with care:&lt;br /&gt;
https://archive.org/details/BOOTSEQUENCE&lt;br /&gt;
&lt;br /&gt;
Music:&lt;br /&gt;
https://www.youtube.com/watch?v=RLszb1cITus&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Tutorial&lt;br /&gt;
|Title of the tutorial=Self care, Body&lt;br /&gt;
|Type of learning session=Holistic&lt;br /&gt;
|Tutorial category=Icebreaking, Energiser&lt;br /&gt;
|Duration (hours)=45 mins&lt;br /&gt;
|Learning objectives=Connect with the body and release accumulated physical stress&lt;br /&gt;
|Methodology='''Exercises 1'''&lt;br /&gt;
&lt;br /&gt;
Various stretching and tension exercises on hands / back / arms&lt;br /&gt;
The explanatory video can be found at the following link: https://archive.org/details/BOOTSEQUENCE&lt;br /&gt;
&lt;br /&gt;
'''Exercises: 2'''&lt;br /&gt;
&lt;br /&gt;
Rest your eyes&lt;br /&gt;
&lt;br /&gt;
Firstly, we close our eyes so we can perform an exercise to concentrate and rest our eyes. Women activists who work with computers for long hours often suffer from sleep disorders, concentration problems and other issues caused by prolonged-exposure to computer screens. This exercise helps to rest and relieve your eyes if you suffer from these problems.&lt;br /&gt;
 &lt;br /&gt;
In a guided meditation with our eyes cloase, we are walking with our eyes around an imaginary clock:&lt;br /&gt;
1. First we walk the clock starting with point 12, going to point 3, point 6, point 9 and we return to point 12. We stop one minute for each point, Repeat the exercise twice&lt;br /&gt;
2. Now we go through the clock and stop at all the numbers on the clock: we start at 12 and we run: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11 and back to 12. We stop Minute for each point.&lt;br /&gt;
3. We remain silent for two minutes with our eyes closed and we gently open our eyes.&lt;br /&gt;
&lt;br /&gt;
'' 'Exercises: 3. Release tensions in the neck and back' ''&lt;br /&gt;
&lt;br /&gt;
Based on the technique of acupressure, we are going to help the energy accumulated in the back and neck flow freely; we will press lightly with our index finger on acupressure points.&lt;br /&gt;
 &lt;br /&gt;
Through this technique we make a direct connection with the energy of another person, so it is necessary to be very focused, calm and to be ready  to share our energy with our partner.&lt;br /&gt;
&lt;br /&gt;
Before we begin, we have to concentrate with a small two-minute meditation with our eyes closed. This is also the time to protect ourselves.&lt;br /&gt;
 &lt;br /&gt;
Steps&lt;br /&gt;
 &lt;br /&gt;
1. Lightly press with your index fingers on the points located on the dimple next to the shoulder blades.&lt;br /&gt;
2. Press lightly with your index fingers on the points located at the base of the neck.&lt;br /&gt;
3. Press lightly with your index fingers on the points located in the neck just below where the neck begins&lt;br /&gt;
4. After releasing energy, the people who worked together thank each other ..&lt;br /&gt;
  &lt;br /&gt;
'' 'Discussion: What did I notice? What did I build and need?&lt;br /&gt;
&lt;br /&gt;
We shared the different emotions with which we connected the exercises. Several companions were able to release emotions that they could not connect with years ago. &lt;br /&gt;
We closed by thanking each other for our shared trust and we shared some happy moments together.&lt;br /&gt;
&lt;br /&gt;
|Number of facilitators involved=1 or 2&lt;br /&gt;
|Technical needs=relaxing area, cushions, sound system&lt;br /&gt;
|Theoretical and on line resources=Bootsequence from Hacking with care:&lt;br /&gt;
https://archive.org/details/BOOTSEQUENCE&lt;br /&gt;
&lt;br /&gt;
Music:&lt;br /&gt;
https://www.youtube.com/watch?v=RLszb1cITus&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Self_Care,_Concentration&amp;diff=8966</id>
		<title>Self Care, Concentration</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Self_Care,_Concentration&amp;diff=8966"/>
				<updated>2017-03-16T14:06:20Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Tutorial&lt;br /&gt;
|Title of the tutorial=Self Care, Concentration&lt;br /&gt;
|Kind of learning session=Holistic&lt;br /&gt;
|Tutorial category=Icebreaking, Energiser&lt;br /&gt;
|Duration (hours)=45 mins&lt;br /&gt;
|Learning objectives=Tools to concentrate, handle situations of crisis / anxiety / stress&lt;br /&gt;
|Methodology=Concentration exercise: We listen to a didactic radio capsule to make our breath conscious&lt;br /&gt;
&lt;br /&gt;
'' 'Exercises: 1. Hold the body' ''&lt;br /&gt;
&lt;br /&gt;
This technique brings peace and tranquillity to people who go through a moment of acute stress situation of anxiety, fear, sadness, despondency and so on. We can use it to lower a crisis situation with a partner&lt;br /&gt;
Through this technique is made a direct connection with the energy of the person affected, therefore it is necessary to be very focused, calm and aware that we will share love, peace, harmony and tranquillity with our companion.&lt;br /&gt;
Before we begin, we have to concentrate, a small two-minute meditation with closed eyes.&lt;br /&gt;
&lt;br /&gt;
''Steps:'''&lt;br /&gt;
&lt;br /&gt;
1. Hold the forehead and base of the skull, placing the hands gently without touching the head. For 3 to 5 minutes.&lt;br /&gt;
2. Hold the crown of the head with your fingertips on the forehead. For 3 to 5 minutes.&lt;br /&gt;
3. Hold your shoulders. For 3 to 5 minutes.&lt;br /&gt;
4. Hold the part over the sternum (chest) and behind the heart (back). For 3 to 5 minutes.&lt;br /&gt;
&lt;br /&gt;
'' 'Exercises: 2. &amp;quot;Switching&amp;quot; (guided fantasy)' ''&lt;br /&gt;
&lt;br /&gt;
To focus the flow of energy&lt;br /&gt;
&lt;br /&gt;
'''Steps:'''&lt;br /&gt;
&lt;br /&gt;
     Sit comfortably and breathe deeply.&lt;br /&gt;
&lt;br /&gt;
     Cross left ankle over right ankle&lt;br /&gt;
&lt;br /&gt;
     Extend your hands to the front. He turns his hands with his thumbs towards the earth.&lt;br /&gt;
&lt;br /&gt;
     Cross your right hand over your left hand. Interlacing the fingers of the hands forming a fist.&lt;br /&gt;
&lt;br /&gt;
     With a fist of the hands touches the center of your sternum.&lt;br /&gt;
&lt;br /&gt;
     Close your eyes, breathe deeply and relax the entire body. Imagine that you can go down to a place in the center of your being.&lt;br /&gt;
&lt;br /&gt;
(You can imagine a center below the navel in the center of the abdomen.) For the people of China this center is called the Dantien. For people from India this is called la Hara).&lt;br /&gt;
&lt;br /&gt;
Relax the tongue inside the mouth and with the tip of the tongue touch behind the upper teeth.&lt;br /&gt;
&lt;br /&gt;
     Breathe deeply and let go of all thoughts. Rest in peace and deep silence for a few minutes.&lt;br /&gt;
&lt;br /&gt;
     After two or three minutes, relax your hands on your legs.&lt;br /&gt;
&lt;br /&gt;
     Take a deep breath and slowly open your eyes.&lt;br /&gt;
&lt;br /&gt;
     Stretch your hands and arms.&lt;br /&gt;
&lt;br /&gt;
'' 'Discussion: Effect of stress and trauma on hacktivists' ''&lt;br /&gt;
&lt;br /&gt;
We share the importance of being able to connect with yourself, with your emotions and how powerful meditation is for it.&lt;br /&gt;
 &lt;br /&gt;
We share diverse experiences of stress, care, lack of care and impacts on the bodies of activists&lt;br /&gt;
  &lt;br /&gt;
'''Closing:'''&lt;br /&gt;
     &lt;br /&gt;
We closed the session with an exercise of collective containment hugging and mesándonos in circle.&lt;br /&gt;
|Number of facilitators involved=1 or 2&lt;br /&gt;
|Technical needs=Comfortable and relaxing space, Computer and small audio system&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Tutorial&lt;br /&gt;
|Title of the tutorial=Self Care, Concentration&lt;br /&gt;
|Kind of learning session=Holistic&lt;br /&gt;
|Tutorial category=Icebreaking, Energiser&lt;br /&gt;
|Duration (hours)=45 mins&lt;br /&gt;
|Learning objectives=Tools to concentrate, handle situations of crisis / anxiety / stress&lt;br /&gt;
|Methodology=Concentration exercise: We listen to a didactic radio capsule to make our breath conscious&lt;br /&gt;
&lt;br /&gt;
'' 'Exercises: 1. Hold the body' ''&lt;br /&gt;
&lt;br /&gt;
This exercise is carried out with a partner to bring peace and calm at moments of acute stress, anxiety, fear, despondency and other situations.&lt;br /&gt;
&lt;br /&gt;
By using this technique, a direct connection is made with the energy of the person affected, therefore it is necessary to be very focused, calm and aware that we will share love, peace, harmony and tranquillity with our companion.&lt;br /&gt;
&lt;br /&gt;
Before we begin, we have to concentrate, so to strat there is a short two-minute meditation with eyes closed.&lt;br /&gt;
&lt;br /&gt;
''Steps:'''&lt;br /&gt;
&lt;br /&gt;
1. Hold the forehead and base of your partner's skull, placing the hands gently without touching the head for for 3 to 5 minutes. (??&lt;br /&gt;
2. Hold the crown of the head with your fingertips on the forehead for 3 to 5 minutes.&lt;br /&gt;
3. Hold the shoulders for 3 to 5 minutes.&lt;br /&gt;
4. Hold the part over the sternum (chest) and behind the heart (back) for 3 to 5 minutes.&lt;br /&gt;
&lt;br /&gt;
'' 'Exercises: 2. &amp;quot;Switching&amp;quot; (guided fantasy)' ''&lt;br /&gt;
&lt;br /&gt;
To focus the flow of energy&lt;br /&gt;
&lt;br /&gt;
'''Steps:'''&lt;br /&gt;
&lt;br /&gt;
     Sit comfortably and breathe deeply.&lt;br /&gt;
&lt;br /&gt;
     Cross left ankle over right ankle&lt;br /&gt;
&lt;br /&gt;
     Extend your hands to the front the turn your hands with thumbs towards the earth.&lt;br /&gt;
&lt;br /&gt;
     Cross your right hand over your left hand, interlacing the fingers of the hands to form a fist.&lt;br /&gt;
&lt;br /&gt;
     With your fist touch the center of your sternum.&lt;br /&gt;
&lt;br /&gt;
     Close your eyes, breathe deeply and relax the entire body. Imagine that you can go down to a place in the center of your being.&lt;br /&gt;
&lt;br /&gt;
(You can imagine a center below the navel in the center of the abdomen.) For the people of China this center is called the Dantien. For people from India this is called la Hara).&lt;br /&gt;
&lt;br /&gt;
Relax the tongue inside the mouth and with the tip of the tongue touch behind the upper teeth.&lt;br /&gt;
&lt;br /&gt;
     Breathe deeply and let go of all thoughts. Rest in peace and deep silence for a few minutes.&lt;br /&gt;
&lt;br /&gt;
     After two or three minutes, relax your hands and place them on your legs.&lt;br /&gt;
&lt;br /&gt;
     Take a deep breath and slowly open your eyes.&lt;br /&gt;
&lt;br /&gt;
     Stretch your hands and arms.&lt;br /&gt;
&lt;br /&gt;
'' 'Discussion: Effect of stress and trauma on hacktivists' ''&lt;br /&gt;
&lt;br /&gt;
We share the importance of being able to connect with yourself, with your emotions and how powerful meditation is to help this.&lt;br /&gt;
 &lt;br /&gt;
We share diverse experiences of stress, care, lack of care and impacts on the bodies of activists.&lt;br /&gt;
  &lt;br /&gt;
'''Closing:'''&lt;br /&gt;
     &lt;br /&gt;
We close the session with an exercise of collective containment, hugging and &amp;quot;mesándonos&amp;quot; (needs explanation) in circle.&lt;br /&gt;
|Number of facilitators involved=1 or 2&lt;br /&gt;
|Other requirements=Comfortable and relaxing space, Computer and small audio system&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Dating_platforms&amp;diff=8965</id>
		<title>Dating platforms</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Dating_platforms&amp;diff=8965"/>
				<updated>2017-03-16T14:04:21Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== What are dating platforms? ==&lt;br /&gt;
&lt;br /&gt;
Dating platforms are pages or applications oriented to facilitate meeting and encounters with other people, sometimes with the purpose of finding a partner or engage into sexual encounters. Usually these services are databases that collect information from users through a profile that can contain personal data, images, locations. There are many types of dating platforms, and all have different interfaces and features. Some are free and others offer payment options which in some cases enlarge the possibility to view more profiles.  Sometimes, the use of free platforms implies that users that no not provide a lot of personal data get restrained in their possibilities to view and access other profiles. &lt;br /&gt;
&lt;br /&gt;
Broadly speaking these platforms are divided into two types: those that work through matching and those that focus on dating.  &amp;quot;Matching&amp;quot; platforms seek to link profiles of users that are compatible, so they request a large amount of information about their preferences, customs, personal characteristics, hobbies, social status, etc.  Platforms that concentrate on dating do not request so much personal and identity information because they focus more on the physical aspects and the immediate encounter between two persons. In both cases, platform's databases can be organized through users 'preferences (who choose other users) or algorithmically, based on the users' registered criteria.&lt;br /&gt;
&lt;br /&gt;
There are platforms that work as web pages and others like mobile phone apps. Some even combine both options. The expansion of these platforms through mobile apps has been a supplement to the services previously offered through websites, and has made the interaction with those platforms (and their users) constant, emphasizing a lot in their geolocation.&lt;br /&gt;
&lt;br /&gt;
==  Privacy policies of dating websites and apps ==&lt;br /&gt;
&lt;br /&gt;
Privacy policies change and evolve over time! That is to say that when accepting the terms of use and privacy policies of a platform does not ensure that those remain always the same. It will be necessary to review these periodically as many platforms do not inform their users about changes in their policies.&lt;br /&gt;
Unfortunately it is difficult to generalize with respect to the privacy policies of these platforms. Many platforms handle the users' personal information without encrypting it, so it can be easily retrieved by third parties. But even, in general, it is the same privacy policies that state that the information entered in the databases can be accessed by third parties.&lt;br /&gt;
&lt;br /&gt;
Most of these platforms become proprietary of the images that are shared or upload, as well as the personal information that has been configured in the profile. This applies even once the account has been closed, so you have to be very sure about the data you want to share in these spaces since there seems to be no turning back. Finally, to be able to know each of the platforms in terms of its privacy policy, it would be important to run a textual cleaning exercise as the analysis of different social networks that has been achieved by [http://Https://myshadow.org/lost-in-small-print the project lost in Small Print from My Shadow] for the following platforms: Google, Facebook, Twitter,  Linkedin, Instagram and Whasapp.&lt;br /&gt;
&lt;br /&gt;
== Information requested by the platforms ==&lt;br /&gt;
&lt;br /&gt;
=== Gender, sexual orientation and practices ===&lt;br /&gt;
&lt;br /&gt;
Many of these platforms require to provide a gender option, genres that are often mutually exclusive (you can only be male or female). If it is oriented towards gays or lesbians, a gender identity is always requested, almost always offering only binary options.&lt;br /&gt;
Many of these platforms are used for exchanges and contacts between LGTBI people, and since in many cases these practices are illegal, prohibited or would harm the user in case of becoming public information,  data shared in these platforms is very sensitive. In general, gender and sexual choices are felt as sensitive information.&lt;br /&gt;
&lt;br /&gt;
=== Images and avatars ===&lt;br /&gt;
&lt;br /&gt;
Several dating platforms request photos (sometimes through profiles of other social networks, such as Facebook) as a participation requirement. Without sharing these images it will not be possible to access other profiles or to access the databases of contact.&lt;br /&gt;
This also happens because many platforms use credentials such as Facebook to open a profile. In that sense, it is not clear how much information from the social network profile the meeting platforms can manage. Several of the apps incorporate much more information from Facebook than the user may have been informed when logging in the dating platform, information such as videos shared in other commercial platforms (such as Youtube or Vimeo), or pages that have been marked with likes. &lt;br /&gt;
You can read more on the [https://arxiv.org/pdf/1505.02906v1.pdf privacy risks on the mobile dating apps].&lt;br /&gt;
&lt;br /&gt;
=== Geolocation ===&lt;br /&gt;
&lt;br /&gt;
Many platforms, especially if they are applications for the mobile phone, ask about your location to allow the encounter with other people. This has its logic, as one of the objectives is to facilitate casual and immediate encounters, it is necessary to know who is near in real time and who can be around at the exact moment in which the app is consulted. Therefore, for severeal of these applications, users in some way depend on the distance being shown in relation to other profiles, but this is also what makes them potentially exposed to the risk of being located by someone with whom they had not planned a meeting.&lt;br /&gt;
Despite of these risks, most users of these platforms based on casual and instant encounters share their real-time location on a daily basis with these apps. This could even allow to determine the user's physical address, track their movements and routine and enable to harass them during the day. Localization information along with other information commonly shared on these platforms such as height, weight, age, habits and customs may serve to locate potential victims. &lt;br /&gt;
&lt;br /&gt;
All these data can be used both by &amp;quot;legal&amp;quot; surveillance (governments, police forces, judiciary among others), or for illegal and malicious purposes (crime, robbery, sexual assault among others). All the information obtained through these platforms could also be used for the purpose of extorting the user. You can read more information on these risks in the [https://arxiv.org/pdf/1505.02906v1.pdf following article  “Privacy Risks in Mobile Dating Apps”].&lt;br /&gt;
&lt;br /&gt;
From the above we understand that the vulnerability of users when sharing their personal information in these platforms can easily expand to the physical terrain. Many apps allow you to detect the exact location from the triangulation of a profile (sometimes even when the exact geolocation option is turned off), making it easy to found and attack the person behind a specific profile.&lt;br /&gt;
&lt;br /&gt;
[https://arxiv.org/pdf/1604.08235v1.pdf You can read a comparative study of three mobile dating apps here.]&lt;br /&gt;
&lt;br /&gt;
=== Other data that can be extracted === &lt;br /&gt;
&lt;br /&gt;
Until now, we have referred to potential vulnerabilities driven by authorities or criminals,, however, most of the information of the users that circulates through these platforms can also be acceded by third parties for advertising purposes.&lt;br /&gt;
&lt;br /&gt;
Because,  the data is not encrypted in practically all of these platforms , third parties are able to access and collect information regarding user's device, its operating system, the applications is using, its location, its internet provider, and even sometimes its credit card details among others.&lt;br /&gt;
&lt;br /&gt;
Besides that, because many dating platforms are linked to other applications and social networks causes third parties to cross databases in order to increase their knowledge about you air order to better know &amp;quot;what you need.&amp;quot; An example could be the possible relationship between fertility and menstrual applications and dating applications. Through knowing your hormonal cycles, third parties could send you advertising information or &amp;quot;right&amp;quot; contacts for the time of the cycle in which you are.&lt;br /&gt;
&lt;br /&gt;
On the other hand, it is possible that your information will be used to extort you. Platforms sometimes can not control what they make available. One example is when Tinder was sharing [https://www.theguardian.com/technology/2014/feb/20/tinder-app-dating-data-location-sharing more information than they  should, you an read about it here]. &lt;br /&gt;
There is also the Ashley Madison case where users got extorted in order to not publish their personal information and more specifically not publishing how they use that extra-matrimonial dating platform, [http://money.cnn.com/2015/08/24/technology/ashley-madison-hack-in-2-minutes you can read more here].&lt;br /&gt;
&lt;br /&gt;
== Erasing your profile ==&lt;br /&gt;
&lt;br /&gt;
Although many dating services offer the possibility of deleting your profile, they do not ensure the removal of the information immediately and many will keep that data forever. In general, platforms displace the responsibility for privacy on the users themselves, as they are not generally very clear about the limitations of their own privacy policies.&lt;br /&gt;
&lt;br /&gt;
In the current state of privacy policies (which could change at any time), developers should consider the different types of sensitive data being collected and stored on mobile devices that could be subject to unauthorized access (whether physical Or remotely), and evaluate how this data could be more protected.&lt;br /&gt;
For example, by encrypting sensitive information stored on a mobile phone. Although it will probably not solve the problem of unauthorized access, it will at least provide an extra layer of difficulty in front of a physical attack. Providers could also implement technical procedures to detect incorrect storage of sensitive data on mobile devices during the app's initial validation process. But as underlined before, the ultimate responsibility lies in the users, who must protect themselves from apps that store their sensitive information without taking the appropriate security and privacy measures. Users should be cautious when selecting apps, particularly those they use to store and transmit personal information.&lt;br /&gt;
&lt;br /&gt;
== Recomendations ==&lt;br /&gt;
&lt;br /&gt;
=== When you create a profile on a dating platform, try to protect your identity and personal information as much as possible===&lt;br /&gt;
&lt;br /&gt;
- Choose a username that does not let anyone know who you are. Do not include your last name or information such as your place of work, address of your house, etc.&lt;br /&gt;
&lt;br /&gt;
- If you can do not include your personal e-mail or your phone number in your profile.&lt;br /&gt;
&lt;br /&gt;
- Regarding images, try to share the ones you do not care that anyone in the world can see.&lt;br /&gt;
&lt;br /&gt;
Regarding passwords and your security when using these platforms:&lt;br /&gt;
&lt;br /&gt;
- Be careful when you access the platforms from a shared device, and also be careful if you do it from a public wi-fi since third parties could intercept your data.&lt;br /&gt;
&lt;br /&gt;
- Do not open attachments that have been sent to you by unknown people (or that you have recently known through the platform)&lt;br /&gt;
&lt;br /&gt;
=== Regarding how to communicate with new contacts ===&lt;br /&gt;
&lt;br /&gt;
- After contacting someone you can try to use another type of platform to communicate with that person. Look for an encrypted communication medium, for example [https://en.wikipedia.org/wiki/Signal_(software) Signal]&lt;br /&gt;
&lt;br /&gt;
Once you are using other means, outside the dating platforms, you can follow some recommendations of the collective Coding Rights&lt;br /&gt;
&lt;br /&gt;
- Use secure channels: You need an app based in free software that offers encryption at all levels, which allows you to block screenshots, send images that self-destruct on both the device from which they were sent and on the server, do not ask for a related phone number, a real name or an email. Unfortunately the app that does all the above does not exist yet. Keep that in mind.&lt;br /&gt;
&lt;br /&gt;
- Use your head: Do not do sexting via SMS, Whatsapp, Telegram, Facebook or Tinder as those platforms enable to identify ou and download your pictures. [https://en.wikipedia.org/wiki/Wickr Wickr], for example, encrypts end-to-end and causes the photos to be erased after being viewed. However Wickr is not open source so its code can not be audited and reviewed. Last not least, do not synchronize your dating apps with any social network.&lt;br /&gt;
&lt;br /&gt;
- And Telegram?: Although it is safer than other apps, it saves your photos during 24 hours on the server and ask you to register.&lt;br /&gt;
&lt;br /&gt;
- Who can see me naked ?: Basically governments and private companies (especially if they have servers) can do it. And, in addition, if you use a public wi-fi, anyone who knows how to intercept the traffic.&lt;br /&gt;
&lt;br /&gt;
- Erase or hide well: Saving encrypted photos is a good security measure, but erasing those is another alternative. Remember that your mobile stores photos in different folders so use programs like CC Cleaner to erase pictures. Think that your mobile can be lost and fall into bad hands, so doing a general erasure/cleaning from time to time is a good idea. If you decide to save them, remember that the PGP suite allows you to encrypt very well those contents. &lt;br /&gt;
&lt;br /&gt;
- Ask for help: If your photos become public it is not a problem meanwhile it is your decision, but if it is not, then you will need to take action. Sometimes it is enough to send an email to the server that hosts the page, others you will need to look for a lawyer. But above all, seek help of trusted friends. Check the following websites for further information about what to do [http://www.withoutmyconsent.org/ withoutmyconsent.org] and [https://www.takebackthetech.net/know-more takebackthetech.net/know-more].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Interesting readings==&lt;br /&gt;
&lt;br /&gt;
Security comparison from Electronic Frontier Foundation: &lt;br /&gt;
https://www.eff.org/es/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites&lt;br /&gt;
&lt;br /&gt;
Nguyen Phong HOANG, Yasuhito ASANO, Masatoshi YOSHIKAWA, &amp;quot;Your Neighbors Are My Spies: Location and other Privacy Concerns in GLBT-focused Location-based Dating Applications&amp;quot; &lt;br /&gt;
https://arxiv.org/pdf/1604.08235v1.pdf&lt;br /&gt;
  &lt;br /&gt;
Security comparison for dating platforms in USA between 2005 and 2013: http://www.secretintelligenceservice.org/wp-content/uploads/2016/02/PIP_Online-Dating-2013.pdf &lt;br /&gt;
&lt;br /&gt;
Margaret Feltz &amp;quot;The Security of Tinder. A Mobile App That May Be More Intimate Than We Thought&amp;quot;:&lt;br /&gt;
http://www.cs.tufts.edu/comp/116/archive/fall2015/mfeltz.pdf&lt;br /&gt;
&lt;br /&gt;
Other Statistics: &lt;br /&gt;
http://www.datingsitesreviews.com/staticpages/index.php?page=Online-Dating-Industry-Facts-Statistics&lt;br /&gt;
&lt;br /&gt;
=== Platforms ===&lt;br /&gt;
&lt;br /&gt;
1.- Tinder&lt;br /&gt;
http://www.forbes.com/sites/anthonykosner/2014/02/18/tinder-dating-app-users-are-playing-with-privacy-fire/#1388ac786758&lt;br /&gt;
&lt;br /&gt;
Privacy Policy https://www.gotinder.com/privacy&lt;br /&gt;
&lt;br /&gt;
2.- Bumble, feminist alternative?&lt;br /&gt;
http://www.semana.com/gente/articulo/tinder-su-competencia-feminista/439477-3&lt;br /&gt;
&lt;br /&gt;
3.- Grindr &lt;br /&gt;
https://nakedsecurity.sophos.com/2014/09/01/grindr-app-has-privacy-issues-whos-surprised/&lt;br /&gt;
&lt;br /&gt;
4.- KickOff&lt;br /&gt;
http://www.fmbox.cl/2016/05/25/kickoff-la-nueva-app-de-citas-que-la-esta-rompiendo-en-latinoamerica/&lt;br /&gt;
&lt;br /&gt;
5.- WooPlus&lt;br /&gt;
http://latam.askmen.com/noticias-dating/2027/article/wooplus-la-app-de-citas-para-quienes-gustan-de-las-chicas-co&lt;br /&gt;
&lt;br /&gt;
6.- Wapa (before called Brenda)&lt;br /&gt;
https://play.google.com/store/apps/details?id=com.wapoapp.wapa&amp;amp;hl=es_419&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
== What are dating platforms? ==&lt;br /&gt;
&lt;br /&gt;
Dating websites and apps are widely used, but can often put their users at risk. Dating websites and apps collect large amounts of highly sensitive information that share - consciously in some cases, for example age, physical charateristics and photos, and in some cases unknowingly, for example geolocation to show people near the user. This guide covers the basic issues you should be aware of when you use a dating website or app.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==  Privacy policies of dating websites and apps ==&lt;br /&gt;
&lt;br /&gt;
Dating website and apps frequently change their privacy policies and often wihtout informing their users. If you've joined one or more dating websites or apps check the privacy policies regularly.&lt;br /&gt;
&lt;br /&gt;
When you check the privacy policy of a dating webiste or app you should check for these isues in particular:&lt;br /&gt;
&lt;br /&gt;
Data Storage - many websites store sensitive data unencrypted so third parties can easily acccess it. Many dating services will also state that the data will be shared with third parties&lt;br /&gt;
&lt;br /&gt;
Intellectual property: Many dating services will claim ownership on any images uplaoded and often the data entered configured to their system.&lt;br /&gt;
&lt;br /&gt;
Account deletion: Many dating services will not commit to removing all your data when you close delete your account.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Information requested by the platforms ==&lt;br /&gt;
&lt;br /&gt;
=== Gender, sexual orientation and practices ===&lt;br /&gt;
&lt;br /&gt;
Many of these platforms require you to enter a binary gender (you can only be male or female). If they are oriented towards gays or lesbians, a gender identity is always requested, almost always offering only binary options.&lt;br /&gt;
&lt;br /&gt;
Any information on gender and sexual choices is of course highly sensitive, particularly in contexts where LGBTQI prcactices are illegal or would harm the user if publicy known.&lt;br /&gt;
&lt;br /&gt;
=== Images and avatars ===&lt;br /&gt;
&lt;br /&gt;
Several dating platforms require photos (sometimes through profiles of other social networks, such as Facebook) to join or to access other profiles. &lt;br /&gt;
&lt;br /&gt;
Many platforms also use accounts from other services, such as Facebook, to open a profile. For these services, it is not clear how much profile information is accessed from other services. Some apps incorporate much more information from Facebook than the user may have been informed about when signing up, for example videos shared in other commercial platforms (such as Youtube or Vimeo), or pages that have been marked with likes. &lt;br /&gt;
You can read more on the [https://arxiv.org/pdf/1505.02906v1.pdf privacy risks on the mobile dating apps].&lt;br /&gt;
&lt;br /&gt;
=== Geolocation ==&lt;br /&gt;
&lt;br /&gt;
Many dating websites, and especially dating apps, access your location so you can meet other people nearby in real time. This may be useful, but sharing detailed and current location data could put people at risk of being located by anyone. This information could potentially reveal a person's physical address, their movements and routine. Many apps allow you to detect the exact location from the triangulation of a profile (sometimes even when the exact geolocation option is turned off), making it easy to finfd a person behind a specific profile.&lt;br /&gt;
&lt;br /&gt;
This data can be used both by &amp;quot;legal&amp;quot; surveillance (governments, police forces, judiciary among others), or for illegal and malicious purposes (harassment, crime, robbery, sexual assault among others). All the information obtained through these platforms could also be used for the purpose of extorting the user. You can read more information on these risks in the [https://arxiv.org/pdf/1505.02906v1.pdf following article  “Privacy Risks in Mobile Dating Apps”].&lt;br /&gt;
&lt;br /&gt;
[https://arxiv.org/pdf/1604.08235v1.pdf You can read a comparative study of three mobile dating apps here.]&lt;br /&gt;
&lt;br /&gt;
=== Other data that can be extracted === &lt;br /&gt;
&lt;br /&gt;
Sensitive personal data in dating websites and apps is not just of interest to legal authorities and criminals, however, it can often be accessed by companies for advertising.&lt;br /&gt;
&lt;br /&gt;
Because the data is not encrypted in practically all of these platforms , third parties are able to access and collect information such as user's device, its operating system, the applications is using, its location, its internet provider, even sometimes the user's credit card details and potentially much more.&lt;br /&gt;
&lt;br /&gt;
By linking with other services, dating websites and apps can enable other companies to crossreference your personal details on the dating service with other services to build a more detailed social profile of you to know &amp;quot;what you need&amp;quot;.  &lt;br /&gt;
&lt;br /&gt;
Besides that, because many dating platforms are linked to other applications and social networks causes third parties to cross databases in order to increase their knowledge about you air order to better know &amp;quot;what you need.&amp;quot; An example could be the possible relationship between fertility and menstrual applications and dating applications. Through knowing your hormonal cycles, third parties could send you advertising information for the time of the cycle in which you are.&lt;br /&gt;
&lt;br /&gt;
Furthermore, it is possible that your information will be used to extort you. Platforms sometimes can not control what they make available. One example was Tinder [https://www.theguardian.com/technology/2014/feb/20/tinder-app-dating-data-location-sharing more information than they  should, you an read about it here]. &lt;br /&gt;
There was also the Ashley Madison case where users were blackmailed in order to not publish their personal information and more specifically not publishing how they use that extra-marital dating platform, [http://money.cnn.com/2015/08/24/technology/ashley-madison-hack-in-2-minutes you can read more here].&lt;br /&gt;
&lt;br /&gt;
== Erasing your profile ==&lt;br /&gt;
&lt;br /&gt;
Although many dating services offer the possibility of deleting your profile, they often do not ensure the removal of the information immediately and many will keep that data indefinitely. In general, platforms place the responsibility for privacy onto the users themselves, as they are generally very unclear about the limitations of their own privacy policies.&lt;br /&gt;
&lt;br /&gt;
In the current state of privacy policies (which could change at any time), developers should consider the different types of sensitive data being collected and stored on mobile devices that could be subject to unauthorized access (whether physical Or remotely), and evaluate how this data could be more protected.&lt;br /&gt;
For example, by encrypting sensitive information stored on a mobile phone. Although it will probably not solve the problem of unauthorized access, it will at least provide an extra layer of difficulty in front of a physical attack. Providers could also implement technical procedures to detect incorrect storage of sensitive data on mobile devices during the app's initial validation process. But as underlined before, the ultimate responsibility lies in the users, who must protect themselves from apps that store their sensitive information without taking the appropriate security and privacy measures. Users should be cautious when selecting apps, particularly those they use to store and transmit personal information.&lt;br /&gt;
&lt;br /&gt;
== Recomendations ==&lt;br /&gt;
&lt;br /&gt;
=== When you create a profile on a dating platform, try to protect your identity and personal information as much as possible===&lt;br /&gt;
&lt;br /&gt;
- Choose a username that does not let anyone know who you are. Do not include your last name or information such as your place of work, address of your house, etc.&lt;br /&gt;
&lt;br /&gt;
- If possible do not include your personal e-mail or your phone number in your profile.&lt;br /&gt;
&lt;br /&gt;
- Regarding images, only share photos you are comfortable with anyone, anywhere seeing.&lt;br /&gt;
&lt;br /&gt;
Regarding passwords and your security when using these platforms:&lt;br /&gt;
&lt;br /&gt;
- Be careful when you access the platforms from a shared device, and also be careful if you do it from a public wi-fi since third parties could intercept your data.&lt;br /&gt;
&lt;br /&gt;
- Do not open attachments that have been sent to you by unknown people (or that you have recently met through the platform)&lt;br /&gt;
&lt;br /&gt;
=== Regarding how to communicate with new contacts ===&lt;br /&gt;
&lt;br /&gt;
- After contacting someone you can try to use another service to communicate with that person. Look for an encrypted communication medium, for example [https://en.wikipedia.org/wiki/Signal_(software) Signal]&lt;br /&gt;
&lt;br /&gt;
Once you are using other means, outside the dating platforms, you can follow some recommendations of the collective Coding Rights&lt;br /&gt;
&lt;br /&gt;
- Use secure channels: You need an app based in free software that offers encryption at all levels, which allows you to block screenshots, send images that self-destruct on both the device from which they were sent and on the server, do not ask for a related phone number, a real name or an email. Unfortunately the app that does all the above does not exist yet. Keep that in mind.&lt;br /&gt;
&lt;br /&gt;
- Use your head: Do not do sexting via SMS, Whatsapp, Telegram, Facebook or Tinder as those platforms enable you to be identified and your pictures to be downloaded. [https://en.wikipedia.org/wiki/Wickr Wickr], for example, encrypts end-to-end and causes the photos to be erased after being viewed. However Wickr is not open source so its code can not be audited and reviewed. Last but not least, do not synchronize your dating apps with any social network.&lt;br /&gt;
&lt;br /&gt;
- And Telegram?: Although it is safer than other apps, it saves your photos during 24 hours on the server and also requires you to register.&lt;br /&gt;
&lt;br /&gt;
- Who can see me naked ?: Basically governments and private companies (especially if they have servers) can. And, in addition, if you use a public wi-fi, anyone who knows how to intercept wifi traffic.&lt;br /&gt;
&lt;br /&gt;
- Erase or hide well: Saving encrypted photos is a good security measure, but deleting photos is a better option. Remember that your mobile stores photos in different folders so use programs like CC Cleaner to erase pictures. Remember that your mobile can be lost and can fall into bad hands, so doing a general erasure/cleaning from time to time is a good idea. If you decide to save your photos, remember that PGP suite allows you to encrypt them very securely. &lt;br /&gt;
&lt;br /&gt;
- Ask for help: If your photos become public wihtout your consent, you will need to take action. Sometimes it is enough to send an email to the server that hosts the page, in other situations you may need to look for a lawyer. But above all, seek help of trusted friends. Check the following websites for further information about what to do [http://www.withoutmyconsent.org/ withoutmyconsent.org] and [https://www.takebackthetech.net/know-more takebackthetech.net/know-more].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Interesting readings==&lt;br /&gt;
&lt;br /&gt;
Security comparison from Electronic Frontier Foundation: &lt;br /&gt;
https://www.eff.org/es/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites&lt;br /&gt;
&lt;br /&gt;
Nguyen Phong HOANG, Yasuhito ASANO, Masatoshi YOSHIKAWA, &amp;quot;Your Neighbors Are My Spies: Location and other Privacy Concerns in GLBT-focused Location-based Dating Applications&amp;quot; &lt;br /&gt;
https://arxiv.org/pdf/1604.08235v1.pdf&lt;br /&gt;
  &lt;br /&gt;
Security comparison for dating platforms in USA between 2005 and 2013: http://www.secretintelligenceservice.org/wp-content/uploads/2016/02/PIP_Online-Dating-2013.pdf &lt;br /&gt;
&lt;br /&gt;
Margaret Feltz &amp;quot;The Security of Tinder. A Mobile App That May Be More Intimate Than We Thought&amp;quot;:&lt;br /&gt;
http://www.cs.tufts.edu/comp/116/archive/fall2015/mfeltz.pdf&lt;br /&gt;
&lt;br /&gt;
Other Statistics: &lt;br /&gt;
http://www.datingsitesreviews.com/staticpages/index.php?page=Online-Dating-Industry-Facts-Statistics&lt;br /&gt;
&lt;br /&gt;
=== Platforms ===&lt;br /&gt;
&lt;br /&gt;
1.- Tinder&lt;br /&gt;
http://www.forbes.com/sites/anthonykosner/2014/02/18/tinder-dating-app-users-are-playing-with-privacy-fire/#1388ac786758&lt;br /&gt;
&lt;br /&gt;
Privacy Policy https://www.gotinder.com/privacy&lt;br /&gt;
&lt;br /&gt;
2.- Bumble, feminist alternative?&lt;br /&gt;
http://www.semana.com/gente/articulo/tinder-su-competencia-feminista/439477-3&lt;br /&gt;
&lt;br /&gt;
3.- Grindr &lt;br /&gt;
https://nakedsecurity.sophos.com/2014/09/01/grindr-app-has-privacy-issues-whos-surprised/&lt;br /&gt;
&lt;br /&gt;
4.- KickOff&lt;br /&gt;
http://www.fmbox.cl/2016/05/25/kickoff-la-nueva-app-de-citas-que-la-esta-rompiendo-en-latinoamerica/&lt;br /&gt;
&lt;br /&gt;
5.- WooPlus&lt;br /&gt;
http://latam.askmen.com/noticias-dating/2027/article/wooplus-la-app-de-citas-para-quienes-gustan-de-las-chicas-co&lt;br /&gt;
&lt;br /&gt;
6.- Wapa (before called Brenda)&lt;br /&gt;
https://play.google.com/store/apps/details?id=com.wapoapp.wapa&amp;amp;hl=es_419&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Faraday_Phone_Pouch&amp;diff=8964</id>
		<title>Faraday Phone Pouch</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Faraday_Phone_Pouch&amp;diff=8964"/>
				<updated>2017-03-16T14:03:14Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== The electromagnetic spectrum ==&lt;br /&gt;
The electromagnetic spectrum or electric radio spectrum is not something material, but the space that is in the air that goes from the ground to the highest part of the sky. In this space, bands frequencies through which airplanes, wi-fi, bluetooth, walkie talkies, radios, telephones communicate are organized. The fact that our phones can be 2G, 3G, 4G means that they are using different bands of the electromagnetic space, through which the information circulates.&lt;br /&gt;
&lt;br /&gt;
For more information about the electromagnetic space:&lt;br /&gt;
https://imagine.gsfc.nasa.gov/science/toolbox/emspectrum1.html&lt;br /&gt;
https://en.wikipedia.org/wiki/Electromagnetic_spectrum&lt;br /&gt;
&lt;br /&gt;
== Faraday Cage == &lt;br /&gt;
&lt;br /&gt;
[[File:Jauladefaraday.jpg|centre]]&lt;br /&gt;
&lt;br /&gt;
It is known as a cage or box of Faraday the effect by which the electromagnetic field inside a conductor in equilibrium is null, nullifying the effect of the external fields. This is because, when the conductor is subjected to an external electromagnetic field, it is polarized, so that it is positively charged in the direction of the electromagnetic field, and negatively charged in the opposite direction. Since the conductor has been polarized, it generates an electric field equal in magnitude but opposite in the direction of the electromagnetic field, then the sum of both fields inside the conductor will be equal to 0.&lt;br /&gt;
&lt;br /&gt;
It is evident in many everyday situations, for example, the malfunction of mobile phones inside elevators or buildings with steel grid structure. One way to check this is with a radio tuned to a Middle Wave station. When it is surrounded with a newspaper, the sound is heard correctly, but if we replace the paper with aluminum foil, the radio will cease to emit sounds: aluminum is an electric conductor and causes Faraday's cage effect.&lt;br /&gt;
&lt;br /&gt;
This phenomenon, discovered by Michael Faraday in 1836, has an important application in airplanes or in the protection of sensitive electronic equipment, such as hard disks or radio and television repeaters located on mountain peaks and exposed to electromagnetic disturbances caused by storms . It also currently serves to block the reading of RFID (Radio Frequency Identifiers) chips, which store personal information that can be intercepted by anyone with a radio-frequency scanner. These chips are found in objects such as passports, credit cards and some driver's licenses.&lt;br /&gt;
&lt;br /&gt;
The Faraday box allows to block the communication of a device with the outside. In the case of mobile phones, they emit signals constantly, even when they are switched off. GPS, which allows us to locate where we are, no matter if it is off or on, also the phone will be locateable by towers that triangulate the signals. The fact that your phone has no signal (when you can not call), does not imply that you are not locateable, or that you have stopped sending signals.&lt;br /&gt;
&lt;br /&gt;
Some household appliances work as Faraday boxes, for example the freezer in the refrigerator, as having a thick layer of metal can have the same effect, if we introduce the cell phone inside, we prevent signals from being emitted.&lt;br /&gt;
&lt;br /&gt;
About Faraday cage:&lt;br /&gt;
https://en.wikipedia.org/wiki/Faraday_cage&lt;br /&gt;
&lt;br /&gt;
Experiment of creating a Farady cage:&lt;br /&gt;
https://backyardbrains.com/experiments/faraday&lt;br /&gt;
&lt;br /&gt;
== How they can intercept the information on your phone ==&lt;br /&gt;
&lt;br /&gt;
One way to intercept the information on your phone is through an IMSI-catcher, a device that can be installed anywhere (a car, a house nearby, etc.), and which simulates to be the antenna of a telephone operator mobile. When installed, the cell phones of this operator will automatically connect with this fake antenna. Thus, this device locates and identifies the switched phones that are in the sector, even if they are not communicating, registering and sending information that identifies them (such as telephone number and device number).&lt;br /&gt;
&lt;br /&gt;
The IMSI-catcher can also relay the communications out of a particular cell phone in such a way that it can not perceive its presence. This way you can have direct access to the content of these broadcast communications that relays and can serve as a live listening device.&lt;br /&gt;
&lt;br /&gt;
You can read a HowTo on IMSI-catcher:&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Detect_false_mobile_antennas&lt;br /&gt;
&lt;br /&gt;
== Build a Faraday Pouch  ==&lt;br /&gt;
&lt;br /&gt;
[[File:Myphoneisoff.jpg|centre|432x432px]]&lt;br /&gt;
&lt;br /&gt;
There are several ways to make a bag for our mobile devices or tablets so that they are not traceable and do not emit signals through which we can be identified or spied upon.&lt;br /&gt;
&lt;br /&gt;
You have to get the conductive textile first which can be bought online in places like these:&lt;br /&gt;
&lt;br /&gt;
[http://www.yshield.com/ww/yshield-shielding-fleece-hnv80-hf-lf-width-100-cm-1-meter exemple 1]&lt;br /&gt;
&lt;br /&gt;
The most important thing is that when you make the cover there is no open space where the signal can leak. Make sure you sew all the edges, you can fold the textile before sewing it.&lt;br /&gt;
&lt;br /&gt;
[[File:-Tela y proceso de bolsa por killyourphone-com.jpg|514x514px|graphs from killyourphone.com]]&lt;br /&gt;
&lt;br /&gt;
The sheath can be made with a sewing machine or by hand. You can design a way to close it, with a button, with velcro, or simply with a clamp.&lt;br /&gt;
&lt;br /&gt;
If the textile is not very thick or powerful, you can use it twice. You can also, if you want to increase the aesthetics of your pouch, use another textile for the outer coating. You can try different designs and shapes, as shown in the drawing:&lt;br /&gt;
&lt;br /&gt;
[[File:killyourphone-desings-drawings.jpg|539x539px|graphs from killyourphone.com]]&lt;br /&gt;
&lt;br /&gt;
== Additional safety measures for your pouch ==&lt;br /&gt;
&lt;br /&gt;
Using in group the pouch can be a very suspicious technique if, for example, several monitored mobiles, located in the same area, are switched off or no longer connected to the network at the same time. If it is done this way it will make it evident that these people have something to hide or they are into something weird. In that sense, the safest practice is still to leave your phone in the house, or at least, remove the battery or put it in the case before leaving your house to not reveal the meeting place.&lt;br /&gt;
&lt;br /&gt;
Be very careful as the Faraday bag does not cancel the microphone. Although the phone is incommunicado with the outside, could have installed some tool that allows to record and then send said recording. Be sure to keep the phone in an acoustically isolated location. You can put the phone with its case inside an airtight glass jar, in the refrigerator, or in another room.&lt;br /&gt;
&lt;br /&gt;
== Other interesting links ==&lt;br /&gt;
http://killyourphone.com/es/&lt;br /&gt;
&lt;br /&gt;
http://briangreen.net/2010/11/diy-ultralight-faraday-cage-pouch.html&lt;br /&gt;
&lt;br /&gt;
http://www.datenform.de/silvereng.html&lt;br /&gt;
&lt;br /&gt;
http://makezine.com/2010/11/18/phonekerchief-blocks-cell-signals/&lt;br /&gt;
&lt;br /&gt;
http://www.backdoorsurvival.com/how-to-build-a-simple-faraday-cage-for-emp-survival/&lt;br /&gt;
&lt;br /&gt;
Forums of testing Faraday cages and pouches:&lt;br /&gt;
&lt;br /&gt;
http://www.survivalistboards.com/showthread.php?t=156111&lt;br /&gt;
&lt;br /&gt;
http://www.survivalistboards.com/showthread.php?t=231373&lt;br /&gt;
&lt;br /&gt;
http://www.survivalistboards.com/showthread.php?t=301999&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
== The electromagnetic spectrum ==&lt;br /&gt;
The electromagnetic spectrum or electric radio spectrum is not something material, but the air space that goes from the ground to the highest part of the atmosphere. In this space, frequency bands are organized, through which airplanes, wi-fi, bluetooth, walkie talkies, radios, telephones communicate, for example 2G, 3G, 4G phone networks use different bands of the electromagnetic space, through which data is transmitted. &lt;br /&gt;
&lt;br /&gt;
For more information about the electromagnetic space:&lt;br /&gt;
https://imagine.gsfc.nasa.gov/science/toolbox/emspectrum1.html&lt;br /&gt;
https://en.wikipedia.org/wiki/Electromagnetic_spectrum&lt;br /&gt;
&lt;br /&gt;
== Faraday Cage == &lt;br /&gt;
&lt;br /&gt;
[[File:Jauladefaraday.jpg|centre]]&lt;br /&gt;
&lt;br /&gt;
The Faraday cage is a structure or item that blocks all electromagnetic fields from outside it to anything within it.&lt;br /&gt;
&lt;br /&gt;
This is based on the effect by which the electromagnetic field inside a conductor in equilibrium is null, and nullifyies the effect of the external fields. This is because when the conductor is subjected to an external electromagnetic field, it is polarized, meaning it is positively charged in the direction of the electromagnetic field, and negatively charged in the opposite direction. Since the conductor has been polarized, it generates an electric field equal in magnitude but opposite in the direction of the electromagnetic field, so the sum of both fields inside the conductor will be equal to 0.&lt;br /&gt;
&lt;br /&gt;
This effect is evident in many everyday situations, for example, the malfunction of mobile phones inside elevators or buildings with a steel grid structure. One way to check this is with a radio tuned to a Medium Wave radio station. When it is surrounded with a newspaper, the sound is heard correctly, but if we replace the paper with aluminum foil, the radio will cease to emit sounds: aluminum is an electric conductor and causes Faraday's cage effect.&lt;br /&gt;
s&lt;br /&gt;
This phenomenon, discovered by Michael Faraday in 1836, is essential for protecting sensitive electronic equipment, such as hard disks or radio and television repeaters, that are exposed to electromagnetic disturbances caused by storms, for example in exposed mountain top antennas or in aircraft. This effect is also used to block the reading of RFID (Radio Frequency Identifiers) chips, which store personal information and can be intercepted by anyone with a radio-frequency scanner. These chips are found in objects such as passports, credit cards and some driver's licenses.&lt;br /&gt;
&lt;br /&gt;
Mobile phones emit signals constantly, even when they are switched off, for example GPS signals, which reveal a phone's location no matter if it is off or on, or the network signal, that enables a phone to be located using triangulation between phone masts. The fact that your phone has no signal (when you cannot call), does not mean that you are not locateable, or that you have stopped sending signals.&lt;br /&gt;
&lt;br /&gt;
Some household appliances work as Faraday boxes, as having a thick layer of metal can have the same effect, for example the freezer in the refrigerator; if a phone is put inside it prevents signals from being emitted.&lt;br /&gt;
&lt;br /&gt;
About the Faraday cage:&lt;br /&gt;
https://en.wikipedia.org/wiki/Faraday_cage&lt;br /&gt;
&lt;br /&gt;
Experiment of creating a Farady cage:&lt;br /&gt;
https://backyardbrains.com/experiments/faraday&lt;br /&gt;
&lt;br /&gt;
== How they can intercept the information on your phone ==&lt;br /&gt;
&lt;br /&gt;
One way to intercept the information on your phone is through an IMSI-catcher, a device that can be installed anywhere (a car, a house nearby, etc.), and which simulates the antenna of a mobile phone mast. When installed, the cell phones of this operator will automatically connect with this fake antenna. Thus, this device locates and identifies the switched phones that are in range, even if they are not communicating, registering or sending information that identifies them (such as telephone number and device number).&lt;br /&gt;
&lt;br /&gt;
The IMSI-catcher can also relay the communications from a particular cell phone in such a way that the phone can not perceive its presence. IN this was an IMSI-catcher can have direct access to the content of from mobile phones and cnan use a mobile phones as a live listening device.&lt;br /&gt;
&lt;br /&gt;
You can read a HowTo on IMSI-catcher ere:&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Detect_false_mobile_antennas&lt;br /&gt;
&lt;br /&gt;
== Build a Faraday Pouch  ==&lt;br /&gt;
&lt;br /&gt;
[[File:Myphoneisoff.jpg|centre|432x432px]]&lt;br /&gt;
&lt;br /&gt;
There are several ways to make a bag for mobile devices or tablets so that they are not traceable and do not emit signals.&lt;br /&gt;
&lt;br /&gt;
You'll need a conductive textile, which can be bought online in places like these:&lt;br /&gt;
&lt;br /&gt;
[http://www.yshield.com/ww/yshield-shielding-fleece-hnv80-hf-lf-width-100-cm-1-meter exemple 1]&lt;br /&gt;
&lt;br /&gt;
The most important thing is that when you make the cover there is no gap from where the signal can leak. Make sure you sew all the edges, you can fold the textile before sewing it.&lt;br /&gt;
&lt;br /&gt;
[[File:-Tela y proceso de bolsa por killyourphone-com.jpg|514x514px|graphs from killyourphone.com]]&lt;br /&gt;
&lt;br /&gt;
The sheath can be made with a sewing machine or by hand. You can design a way to close it: with a button, with velcro, or simply with a clamp.&lt;br /&gt;
&lt;br /&gt;
If the textile is not very thick or strong, you can use two layers. If you want to improve the appearance of your pouch, you can use another textile for the outer coating. You can try different designs and shapes, as shown in the drawing:&lt;br /&gt;
&lt;br /&gt;
[[File:killyourphone-desings-drawings.jpg|539x539px|graphs from killyourphone.com]]&lt;br /&gt;
&lt;br /&gt;
== Additional safety measures for your pouch ==&lt;br /&gt;
&lt;br /&gt;
Using Farady pouches as a group can lead to suspicion. If for example, several monitored mobiles located in the same area, are switched off or no longer connected to the network at the same time, it could make it obvious that those people have something to hide or are doing something unusual. In that situation, the safest practice is still to leave your phone in the house, or at least remove the battery, or put it in the case before leaving your house so as not to reveal the meeting place.&lt;br /&gt;
&lt;br /&gt;
Take extra care regarding sound, as the Faraday bag does not cancel the microphone. Although the phone is incommunicado with the outside, a tool could have been installed that allows sound to be recorded and sent somewhere later. Be sure to keep the phone in an acoustically isolated location; you can put the phone with its case inside an airtight glass jar, in the refrigerator, or in another room.&lt;br /&gt;
&lt;br /&gt;
== Other interesting links ==&lt;br /&gt;
http://killyourphone.com/es/&lt;br /&gt;
&lt;br /&gt;
http://briangreen.net/2010/11/diy-ultralight-faraday-cage-pouch.html&lt;br /&gt;
&lt;br /&gt;
http://www.datenform.de/silvereng.html&lt;br /&gt;
&lt;br /&gt;
http://makezine.com/2010/11/18/phonekerchief-blocks-cell-signals/&lt;br /&gt;
&lt;br /&gt;
http://www.backdoorsurvival.com/how-to-build-a-simple-faraday-cage-for-emp-survival/&lt;br /&gt;
&lt;br /&gt;
Forums of testing Faraday cages and pouches:&lt;br /&gt;
&lt;br /&gt;
http://www.survivalistboards.com/showthread.php?t=156111&lt;br /&gt;
&lt;br /&gt;
http://www.survivalistboards.com/showthread.php?t=231373&lt;br /&gt;
&lt;br /&gt;
http://www.survivalistboards.com/showthread.php?t=301999&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Cryptocurrency_(Buying_things_anonymously)&amp;diff=8963</id>
		<title>Cryptocurrency (Buying things anonymously)</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Cryptocurrency_(Buying_things_anonymously)&amp;diff=8963"/>
				<updated>2017-03-16T14:02:27Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:moneda.png|400px|thumb|center|&amp;lt;ref&amp;gt;ASCII de una moneda del siglo VI a. C. 1/3 de Estátera.&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
A cryptomoney is a type of currency that allows economic exchanges, and which is characterized by being stored electronically and incorporates encryption for security of transactions. Intuitively we can think of cryptomoneys as digital coins, however because of the technology they incorporate and their functioning they are not equivalent. Cryptomoney can serve, like conventional currencies, to buy products or pay for services.&lt;br /&gt;
&lt;br /&gt;
There is no consensual definition, wikipedia tell us the following:&lt;br /&gt;
&lt;br /&gt;
A cryptocurrency (or crypto currency) is a digital asset designed to work as a medium of exchange using cryptography to secure the transactions and to control the creation of additional units of the currency. Cryptocurrencies are a subset of alternative currencies, or specifically of digital currencies. Bitcoin became the first decentralized cryptocurrency in 2009. Since then, numerous cryptocurrencies have been created. These are frequently called altcoins, as a blend of bitcoin alternative. Bitcoin and its derivatives use decentralized control  as opposed to centralized electronic money/centralized banking systems. The decentralized control is related to the use of bitcoin's blockchain transaction database in the role of a distributed ledger &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Cryptocurrency&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are different types of criptomoneys but they have in common that their value is determined by the supply and the demand and that in principle they are not falsifiable (even tough this does not prevent always fraud exists, see for example the case of OneCoin&amp;lt;ref&amp;gt;https://steemit.com/money/@morpheustitania/onecoin-is-a-scam&amp;lt;/ref&amp;gt;).&lt;br /&gt;
&lt;br /&gt;
Broadly speaking, we can trace the birth of cryptomonedas as part of the criptopunk movement that appealed to the use of cryptography as a tactic for social change. One of the first electronic coins was Digicash launched in 1990 by David Chaum, this centrally-operated currency already incorporated encryption and allowed electronic transactions&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/DigiCash&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Seven years later Adam Black proposed Hashcash a mining system that uses a proof-of-work algorithm work (POW &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Proof-of-work_system&amp;lt;/ref&amp;gt;) originally used to limit spam (unwanted mail) and denial of service (DoS) attacks and which would be later incorporated into cryptomoenys. In 2009,  an unknown identity under the pseudonym Satoshi Nakamoto published Bitcoin  which is one of the most used cryptomoneys and that we will use to develop this ''How to''. &lt;br /&gt;
&lt;br /&gt;
Bitcoin is characterised by &amp;lt;ref&amp;gt;http://chimera.labs.oreilly.com/books/1234000001802/ch01.html#_what_is_bitcoin&amp;lt;/ref&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; A decentralized p2p network (the bitcoin protocol)&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Transactions are public (the block chain)&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; A decentralized deterministic coin and mathematical emission (distributed mining)&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; A decentralized transaction verification system (transaction script)&lt;br /&gt;
&lt;br /&gt;
Currently it has the following fundamental principles &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Blockchain_%28database%29&amp;lt;/ref&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; 21 million: the number of units will never exceed 21 million bitcoins.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Uncensored: no one can ban or censor valid transactions.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Open source: Bitcoin's source code should always be accessible to everyone.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Without permission: nobody can prevent participation in the network.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Pseudonym: no identification is required to participate in the Bitcoin network.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Fungible: each unit is interchangeable.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Irreversible payments: Confirmed transactions can not be modified or eliminated. The story is unforgettable.&lt;br /&gt;
&lt;br /&gt;
You can watch the following video to see how a mining farm of bitcoins looks like in China&lt;br /&gt;
{{#ev:vimeo|https://vimeo.com/141600878}}&lt;br /&gt;
&lt;br /&gt;
== What do you need?==&lt;br /&gt;
&lt;br /&gt;
A USB with TAILS and a some persistence&lt;br /&gt;
&lt;br /&gt;
== How can I use bitcoins to buy anonymously?==&lt;br /&gt;
&lt;br /&gt;
To be able to make transactions with Bitcoin you need to have an address (with which you can receive or send Bitcoins) and keys, with which your transactions will be signed, the set of keys is known as a Wallet.&lt;br /&gt;
[[File:Wallet_bitcoin.png|400px|thumb|left|Wallets &amp;lt;ref&amp;gt;https://bitcoin.org/en/choose-your-wallet&amp;lt;/ref&amp;gt;]] &lt;br /&gt;
&lt;br /&gt;
Bitcoin currently has a large number of wallets that can work as programs, mobile applications and even as devices.&lt;br /&gt;
&lt;br /&gt;
Although Bitcoin incorporates encryption in order to achieve anonymity in purchases, it requires that transactions can not be associated with your legal identity. This is not so simple, you can see more information at: https://en.bitcoin.it/wiki/Anonymity. In our case we will use the wallet that comes in TAILS by default: Electrum &amp;lt;ref&amp;gt;https://electrum.org/#home&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
=== Five steps to create a wallet in TAILS===&lt;br /&gt;
&lt;br /&gt;
 1) In Applications go to Internet and open Electrum Wallet Bitcoin&lt;br /&gt;
[[File:electrum1.png|400px|thumb|center|Electrum]] &lt;br /&gt;
&lt;br /&gt;
2) Follow the process by selecting the option to create a new wallet standard&lt;br /&gt;
[[File:electrum2.png|400px|thumb|center|Creando tu cuenta.]]&lt;br /&gt;
&lt;br /&gt;
3) The wallet creation program generates 13 words and suggests you copy them on paper or use a QRT code. You can choose the one you prefer but for the QRT code you will also need a program that reads this type of code.&lt;br /&gt;
[[File:electrum3.png|400px|thumb|center|]]&lt;br /&gt;
&lt;br /&gt;
4) You will be prompted for a password (use a strong one and do not forget it)&lt;br /&gt;
[[File:electrum4.png|400px|thumb|center|]]&lt;br /&gt;
&lt;br /&gt;
5) The program will ask you if it connects itself or if you prefer to do it manually, you can select the option that better suits you.&lt;br /&gt;
[[File:electrum5.png|400px|thumb|center|]]&lt;br /&gt;
&lt;br /&gt;
6) Your wallet has been created. You now have an address to 'receive' deposits and you can make transactions with others by sending them Bitcoins if you know the shipping addresses.&lt;br /&gt;
[[File:electrum6.png|400px|thumb|left|Adress to receive Bitcoins]]&lt;br /&gt;
[[File:electrum7.png|400px|thumb|none|Sending Bitcoins]]&lt;br /&gt;
&lt;br /&gt;
 ===Adding Bitcoins to your wallet===&lt;br /&gt;
&lt;br /&gt;
There are different ways to get your wallet to receive bitcoins, in our case to do it anonymously we suggest to find some intermediary organization that is dedicated to the transfer of bitcoins and that allows you to make a deposit in a bank that has ATMs that will not force you to associate the deposit with a personal legal identity (eg &amp;lt;ref&amp;gt; https://www.bitboat.net/en/help&amp;lt;/ ref&amp;gt;) This type of organization will act as an intermediary and it will provide you with a deposit account that will enable you to get the bitcoins to your wallet. Another way is through an intermediary organization that enable instant deposits like MoneyPolo&amp;lt;ref&amp;gt;https://moneypolo.com&amp;lt;/ref&amp;gt; . &lt;br /&gt;
&lt;br /&gt;
===Buying===&lt;br /&gt;
As in other types of electronic transactions, what you need is to be told where to send the bitcoins (shipping address) and places where you accept this type of currency, for example it is possible to pay with bitcoins domains, electronic products, services, medicines, you can have some ideas in: https://en.wikipedia.org/wiki/OpenBazaar.&lt;br /&gt;
&lt;br /&gt;
===Final notes===&lt;br /&gt;
Remember that all transactions are public so to avoid addresses being associated with purchases you can make deposits of smaller quantities of bitcoins and transfer equally smaller amounts.&lt;br /&gt;
&lt;br /&gt;
You should also remember that ATMs have cameras and that now it is becoming easier to use  face recognition through images.&lt;br /&gt;
&lt;br /&gt;
Finally, there are countries where it is illegal to use Bitcoins &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Legality_of_bitcoin_by_country&amp;lt;/ref&amp;gt; . &lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:moneda.png|400px|thumb|center|&amp;lt;ref&amp;gt;ASCII de una moneda del siglo VI a. C. 1/3 de Estátera.&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
A cryptomoney is a type of currency that is stored electronically and incorporates encryption for security of transactions. Intuitively, we can think of cryptomoneys as digital coins, however, because of the technology they incorporate and their functioning they are not equivalent. Cryptomoney can serve, like conventional currencies, to buy products or pay for services.&lt;br /&gt;
&lt;br /&gt;
There is no single universally accetped definition of crypto currencies, but Wikipedia states:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;A cryptocurrency (or crypto currency) is a digital asset designed to work as a medium of exchange using cryptography to secure the transactions and to control the creation of additional units of the currency. Cryptocurrencies are a subset of alternative currencies, or specifically of digital currencies. Bitcoin became the first decentralized cryptocurrency in 2009. Since then, numerous cryptocurrencies have been created. These are frequently called altcoins, as a blend of bitcoin alternative. Bitcoin and its derivatives use decentralized control  as opposed to centralized electronic money/centralized banking systems. The decentralized control is related to the use of bitcoin's blockchain transaction database in the role of a distributed ledger &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Cryptocurrency&amp;lt;/ref&amp;gt;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
There are many different types of cryptocurrencies, but all of them have in common that their value is determined by supply and demand, and that, in principle at least, they are not falsifiable (even though this does not prevent all fraud, see for example the case of OneCoin&amp;lt;ref&amp;gt;https://steemit.com/money/@morpheustitania/onecoin-is-a-scam&amp;lt;/ref&amp;gt;).&lt;br /&gt;
&lt;br /&gt;
Broadly speaking, we can trace the birth of cryptocurrencies to the criptopunk movement that advocated the use of cryptography as a tactic for social change. One of the first electronic coins was Digicash, launched in 1990 by David Chaum. This centrally-operated currency already incorporated encryption and allowed electronic transactions&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/DigiCash&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Seven years later Adam Black proposed Hashcash, a mining system that uses a proof-of-work algorithm (POW &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Proof-of-work_system&amp;lt;/ref&amp;gt;) originally used to limit spam (unwanted mail) and denial of service (DoS) attacks, and would later be incorporated into other cyptocurrencies. In 2009  an unknown individual using the pseudonym Satoshi Nakamoto published Bitcoin, one of the most used cryptocurrencies and the main focus of  this''How to' guide'. &lt;br /&gt;
&lt;br /&gt;
Bitcoin is characterised by &amp;lt;ref&amp;gt;http://chimera.labs.oreilly.com/books/1234000001802/ch01.html#_what_is_bitcoin&amp;lt;/ref&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; A decentralized p2p network (the bitcoin protocol)&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Public transactions (the block chain)&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; A decentralized &amp;quot;deterministic&amp;quot; coin and mathematical production (distributed mining)&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; A decentralized transaction verification system (transaction script)&lt;br /&gt;
&lt;br /&gt;
Currently it has the following fundamental principles &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Blockchain_%28database%29&amp;lt;/ref&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Absolute limit on currency prodcution: the number of units will never exceed 21 million bitcoins.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Uncensored: no one can ban or censor valid transactions.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Open source: Bitcoin's source code should always be accessible to everyone.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Without permission: nobody can prevent participation in the network.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Pseudonym: no identification is required to participate in the Bitcoin network.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Fungible: each unit is interchangeable.&lt;br /&gt;
&lt;br /&gt;
-&amp;gt; Irreversible payments: Confirmed transactions can not be modified or reversed. The story is unforgettable.&lt;br /&gt;
&lt;br /&gt;
You can watch the following video to see how a mining farm of bitcoins looks like in China&lt;br /&gt;
{{#ev:vimeo|https://vimeo.com/141600878}}&lt;br /&gt;
&lt;br /&gt;
== What do you need?==&lt;br /&gt;
&lt;br /&gt;
A TAILS USB with persistance&lt;br /&gt;
&lt;br /&gt;
== How can I use bitcoins to buy anonymously?==&lt;br /&gt;
&lt;br /&gt;
To be able to make transactions with Bitcoin you need to have an address (with which you can receive or send Bitcoins) and keys, with which your transactions will be signed. This set of keys is known as a Wallet.&lt;br /&gt;
[[File:Wallet_bitcoin.png|400px|thumb|left|Wallets &amp;lt;ref&amp;gt;https://bitcoin.org/en/choose-your-wallet&amp;lt;/ref&amp;gt;]] &lt;br /&gt;
&lt;br /&gt;
Bitcoin currently has a large number of wallets that can work as programs, mobile applications and even as devices.&lt;br /&gt;
&lt;br /&gt;
Although Bitcoin incorporates encryption in order to achieve anonymity in purchases, it requires that transactions can not be associated with your legal identity. This is not so simple, you can see more information at: https://en.bitcoin.it/wiki/Anonymity. For thois guide we will use the wallet that comes in TAILS by default: Electrum &amp;lt;ref&amp;gt;https://electrum.org/#home&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
=== Five steps to create a wallet in TAILS===&lt;br /&gt;
&lt;br /&gt;
 1) In Applications go to Internet and open Electrum Wallet Bitcoin&lt;br /&gt;
[[File:electrum1.png|400px|thumb|center|Electrum]] &lt;br /&gt;
&lt;br /&gt;
2) Follow the process by selecting the option to create a new wallet standard&lt;br /&gt;
[[File:electrum2.png|400px|thumb|center|Creando tu cuenta.]]&lt;br /&gt;
&lt;br /&gt;
3) The wallet creation program generates 13 words and suggests you copy them on paper or use a QRT code. You can choose the one you prefer but for the QRT code you will also need a program that reads this type of code.&lt;br /&gt;
[[File:electrum3.png|400px|thumb|center|]]&lt;br /&gt;
&lt;br /&gt;
4) You will be prompted for a password (use a strong one and do not forget it)&lt;br /&gt;
[[File:electrum4.png|400px|thumb|center|]]&lt;br /&gt;
&lt;br /&gt;
5) The program will ask you if it connects itself or if you prefer to do it manually, you can select the option that better suits you.&lt;br /&gt;
[[File:electrum5.png|400px|thumb|center|]]&lt;br /&gt;
&lt;br /&gt;
6) Your wallet has been created. You now have an address to 'receive' deposits and you can make transactions with others by sending them Bitcoins if you know their shipping addresses.&lt;br /&gt;
[[File:electrum6.png|400px|thumb|left|Adress to receive Bitcoins]]&lt;br /&gt;
[[File:electrum7.png|400px|thumb|none|Sending Bitcoins]]&lt;br /&gt;
&lt;br /&gt;
 ===Adding Bitcoins to your wallet===&lt;br /&gt;
&lt;br /&gt;
There are different ways to get your wallet to receive bitcoins. To buy Bitcoins anonymously you can find an intermediary organization that trades bitcoins and that will accept an anonymous bank ATM deposit (you'll need to find a bank that offers this service -eg &amp;lt;ref&amp;gt; https://www.bitboat.net/en/help&amp;lt;/ ref&amp;gt;). Once you have made your deposit te intermeidary organization will transfer the bitcoins to your wallet. Another way is through an intermediary organization that offers instant deposits like MoneyPolo&amp;lt;ref&amp;gt;https://moneypolo.com&amp;lt;/ref&amp;gt; . &lt;br /&gt;
&lt;br /&gt;
===Buying===&lt;br /&gt;
As in other types of electronic transactions, ot buy something, you need to find services that accept bitcoins, for example sellers of  domains, electronic products, services, medicines, and then you need to know where to send the bitcoins, i.e. a shipping address: https://en.wikipedia.org/wiki/OpenBazaar.&lt;br /&gt;
&lt;br /&gt;
===Final notes===&lt;br /&gt;
Remember that all transactions are public so, to avoid addresses being associated with purchases, you can make deposits of small quantities of bitcoins and transfer equally small amounts.&lt;br /&gt;
&lt;br /&gt;
You should also remember that ATMs have cameras and that effective facial recognition is increasingly widely used.&lt;br /&gt;
&lt;br /&gt;
Finally, there are countries where it is illegal to use Bitcoins &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Legality_of_bitcoin_by_country&amp;lt;/ref&amp;gt; . &lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Deep_web&amp;diff=8962</id>
		<title>Deep web</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Deep_web&amp;diff=8962"/>
				<updated>2017-03-16T14:01:38Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== What is the deep web??==&lt;br /&gt;
&lt;br /&gt;
The deep web refers to all the information that is in the world wide we but is not indexed so it is not possible to access it using search engines like Google &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Deep_web&amp;lt;/ref&amp;gt;. Web indexing (or Internet indexing) refers to various methods for indexing the contents of a website or of the Internet as a whole. Individual websites or intranets may use a back-of-the-book index, while search engines usually use keywords and metadata to provide a more useful vocabulary for Internet or onsite searching. With the increase in the number of periodicals that have articles online, web indexing is also becoming important for periodical websites  &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Web_indexing&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:deep_web.png|400px|center|alt=Web profunda]]&lt;br /&gt;
&lt;br /&gt;
According to the wikipedia &amp;quot;The portion of the web that is indexed by standard search engines is known as the surface web. As of 2001, the deep web was several orders of magnitude larger than the surface web. An analogy of an iceberg used by Denis Shestakov represents the division between surface web and deep web respectively: It is impossible to measure, and harsh to put estimates on, the size of the deep web because the majority of the information is hidden or locked inside databases. Early estimates suggested that the deep web is 400 to 550 times larger than the surface web. However, since more information and sites are always being added, it can be assumed that the deep web is growing exponentially at a rate that cannot be quantified.”&lt;br /&gt;
&lt;br /&gt;
A common confusions is to mix up the deep web and the dark web. Latter corresponds to a part of the deep web, which besides not being indexed has been hidden using methods such as masking IP and/or requiring special permissions or the use of specific software to access it &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Dark_web&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
But if it is not indexed, how do we access it? Below we describe two ways you can immerse yourself in the deep web.&lt;br /&gt;
&lt;br /&gt;
== Navigating the deep web using Tor==&lt;br /&gt;
&lt;br /&gt;
[[File:Tor-logo-2011-flat.svg|120px|left|alt=TOR]]&lt;br /&gt;
&lt;br /&gt;
One of the easiest ways is to use the  hidden service protocol TOR &amp;lt;ref&amp;gt;https://www.torproject.org/docs/hidden-services.html.en&amp;lt;/ref&amp;gt; that operates within the anonymous distributed network of TOR &amp;lt;ref&amp;gt;https://www.torproject.org/about/overview.html.en#thesolution&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
Considering the wide variety of users and type of information that you can find inside the deep web, it is initially easier and safer to access it using the  '''TOR browser''' &amp;lt;Ref&amp;gt; https://www.torproject.org/projects/torbrowser.html.en &amp;lt;/ ref&amp;gt; that is available for various operating systems. Alternatively to maximize your security we recommend the use of '''TAILS''' &amp;lt;ref&amp;gt;https://tails.boum.org/&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Maybe you can ask yourself  if it is not indexed where to start?&lt;br /&gt;
&lt;br /&gt;
===Case A===&lt;br /&gt;
You get an .onion address. Those are “.onion is a special-use top level domain suffix designating an anonymous hidden service reachable via the Tor network. Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed, Internet programs such as web browsers can access sites with .onion addresses by sending the request through the network of Tor servers. The purpose of using such a system is to make both the information provider and the person accessing the information more difficult to trace, whether by one another, by an intermediate network host, or by an outsider  &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/.onion&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
For instance, you receive:&lt;br /&gt;
 http://duskgytldkxiuqc6.onion&lt;br /&gt;
you need to change the  .onion for something like:&lt;br /&gt;
&lt;br /&gt;
.onion.to&lt;br /&gt;
&lt;br /&gt;
.onion.city&lt;br /&gt;
&lt;br /&gt;
.onion.cab&lt;br /&gt;
&lt;br /&gt;
or any other domain made available by the network of volunteers of TOR2web  &amp;lt;ref&amp;gt;https://tor2web.org/&amp;lt;/ref&amp;gt;.  &lt;br /&gt;
&lt;br /&gt;
and you need to open it up in the browser '''TOR'''.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
Deep_web2.png|Opening duskgytldkxiuqc6.onion in a common browser&lt;br /&gt;
Deep_web3.png|Opening duskgytldkxiuqc6.onion.to with TOR browser&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Case B===&lt;br /&gt;
&lt;br /&gt;
You want to look for a page.&lt;br /&gt;
&lt;br /&gt;
You can begin in:&lt;br /&gt;
http://deepweb.pw/&lt;br /&gt;
&lt;br /&gt;
This page could be opened in any browser but only using '''TOR''' browser you will be able to access  .onion pages. &lt;br /&gt;
&lt;br /&gt;
There you can find interesting sites like the Hidden wiki.&lt;br /&gt;
&lt;br /&gt;
You can also look for information here:&lt;br /&gt;
 https://ahmia.fi/search/&lt;br /&gt;
&lt;br /&gt;
Or if you are interested in websites about leaks:&lt;br /&gt;
 https://en.wikipedia.org/wiki/GlobaLeaks#Implementations&lt;br /&gt;
&lt;br /&gt;
Other possible search places:&lt;br /&gt;
 http://3g2upl4pq6kufc4m.onion/&lt;br /&gt;
&lt;br /&gt;
 https://www.reddit.com//r/onions&lt;br /&gt;
&lt;br /&gt;
You should consider that the availability of information in many cases is temporary, so you will need to spend considerable time to get used to the deep web and search more fruitfully. Also the language can be a limitation and before entering forums remember that they generally use specific jargon&amp;lt;ref&amp;gt;http://domekit.cc/survival-kit-in-the-deep-web/&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
===Case C===&lt;br /&gt;
You can also use the hidden services of Riseup&lt;br /&gt;
 https://help.riseup.net/en/tor&lt;br /&gt;
&lt;br /&gt;
==Adding data to the deep web==&lt;br /&gt;
&lt;br /&gt;
Well now you surf the web deep but how do you add information?&lt;br /&gt;
&lt;br /&gt;
If you need to add a file you can use the services '' Share '' of Riseup that let you upload a file up to 50mb for no more than a week. You can find the .onion.to league at:  https://help.riseup.net/en/tor&lt;br /&gt;
&lt;br /&gt;
[[File:Deep_web4.png|400px|center|alt= Riseup Services]]&lt;br /&gt;
&lt;br /&gt;
The second option is using zeronet.io. This tool allows you to publish open, free and uncensored blogs and it uses the Bitcoin cryptography and the BitTorrent network.&lt;br /&gt;
&lt;br /&gt;
Although you can use this tool in different operating systems the option we recommend is '''zeronet + TAILS'''  (https://tails.boum.org/) because it represents the safest form, however it requires that you dedicate a little more time to its configuration since you must know how to enable ports in the internet modem.&lt;br /&gt;
&lt;br /&gt;
[[File:zeronet_logo.png|120px|none|alt=zeronet.io|ZeroNet]] &lt;br /&gt;
&lt;br /&gt;
What do you need?&lt;br /&gt;
&lt;br /&gt;
One USB with TAILS and persistencia activated.&lt;br /&gt;
&lt;br /&gt;
Enable the port  15441 of your modem&lt;br /&gt;
&lt;br /&gt;
1) You have login to a TAILS session using persistence and advanced settings to access the ''root'' terminal.&lt;br /&gt;
&lt;br /&gt;
2) In the terminal you need to write the following commands:&lt;br /&gt;
&lt;br /&gt;
To update and install the required dependencies:&lt;br /&gt;
&lt;br /&gt;
 $ sudo apt-get update&lt;br /&gt;
 $ sudo apt-get upgrade&lt;br /&gt;
 $ sudo apt-get install python-msgpack python-gevent&lt;br /&gt;
&lt;br /&gt;
For downloading zeronet:&lt;br /&gt;
&lt;br /&gt;
 $ wget https://github.com/HelloZeroNet/ZeroNet/archive/master.tar.gz&lt;br /&gt;
&lt;br /&gt;
To unzip the downloaded file:&lt;br /&gt;
&lt;br /&gt;
 $ tar xvpfz master.tar.gz&lt;br /&gt;
&lt;br /&gt;
To enter the file:&lt;br /&gt;
&lt;br /&gt;
 $ cd ZeroNet-master&lt;br /&gt;
&lt;br /&gt;
For starting:&lt;br /&gt;
&lt;br /&gt;
 $ python zeronet.py&lt;br /&gt;
&lt;br /&gt;
If this option does not work you need to check your IP&lt;br /&gt;
&lt;br /&gt;
 $ sudo ifconfig&lt;br /&gt;
&lt;br /&gt;
This command will tell you what your internet address (inet addr), for example in the image it is 10.14.241.166&lt;br /&gt;
[[File:ifconfig.png|400px|center|alt=Comando ifconfig]] &lt;br /&gt;
&lt;br /&gt;
 $ python zeronet.py --proxy 127.0.0.1:9050 --tor disable --ui_ip inet_addr&lt;br /&gt;
In the previous command you must replace inet_addr with the one that corresponds to your computer&lt;br /&gt;
&lt;br /&gt;
With those steps you will have started the services of zeronet&lt;br /&gt;
&lt;br /&gt;
3) In the browser '''TOR''' you need to open the ptions of '''Configuration''' and select ''Advanced'' where you will find the tab  '''Network''' and in the first point you need to go to '''Connection'''  '''Options''' and add in '''No proxi''' 127.0.0.1 or your own inet_addr&lt;br /&gt;
&lt;br /&gt;
[[File:Proxy_conf_tor.png|400px|center|alt=Configuration options for the TOR browser]]&lt;br /&gt;
&lt;br /&gt;
After you can open/&lt;br /&gt;
 http://inet_addr:43110/&lt;br /&gt;
for instance:&lt;br /&gt;
 http://127.0.0.1:43110&lt;br /&gt;
&lt;br /&gt;
And you will find the graphical interface&lt;br /&gt;
&lt;br /&gt;
[[File:zeronet.png|400px]]&lt;br /&gt;
&lt;br /&gt;
To create a new blog you only need to activate '''Zero blog''' and use the tool for cloning.&lt;br /&gt;
[[File:Zeronet2.png|400px]] &lt;br /&gt;
&lt;br /&gt;
'''Note:'''&lt;br /&gt;
&lt;br /&gt;
You will only be able to upload information to the network zeronet if your port 15441 is enabled&lt;br /&gt;
You can see more information about set up and configuration here [https://github.com/HelloZeroNet/ZeroNet ZeroNet]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== What is the deep web??==&lt;br /&gt;
&lt;br /&gt;
The deep web refers to all the information that is in the world wide we but is not indexed, so it is not possible to access it using search engines such as Google &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Deep_web&amp;lt;/ref&amp;gt;. Web indexing (or Internet indexing) refers to various methods for indexing the contents of a website or of the Internet as a whole. Individual websites or intranets may use a &amp;quot;back-of-the-book&amp;quot; index, while search engines usually use keywords and metadata to provide a more useful vocabulary for Internet or onsite searching. With the increase in the number of periodicals that have articles online, web indexing is also becoming important for periodical websites  &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Web_indexing&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:deep_web.png|400px|center|alt=Web profunda]]&lt;br /&gt;
&lt;br /&gt;
According to Wikipedia, &amp;quot;The portion of the web that is indexed by standard search engines is known as the surface web. As of 2001, the deep web was several orders of magnitude larger than the surface web. An analogy of an iceberg used by Denis Shestakov represents the division between surface web and deep web respectively: It is impossible to measure, and harsh to put estimates on, the size of the deep web because the majority of the information is hidden or locked inside databases. Early estimates suggested that the deep web is 400 to 550 times larger than the surface web. However, since more information and sites are always being added, it can be assumed that the deep web is growing exponentially at a rate that cannot be quantified.”&lt;br /&gt;
&lt;br /&gt;
A common confusions is to mix up the deep web and the dark web; the latter corresponds to a part of the deep web, which besides not being indexed, has been hidden using methods such as masking IP and/or requiring special permissions or the use of specific software to access it &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Dark_web&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
But if it is not indexed, how do we access it? Below we describe two ways you can immerse yourself in the deep web.&lt;br /&gt;
&lt;br /&gt;
== Navigating the deep web using Tor==&lt;br /&gt;
&lt;br /&gt;
[[File:Tor-logo-2011-flat.svg|120px|left|alt=TOR]]&lt;br /&gt;
&lt;br /&gt;
One of the easiest ways is to use the  hidden service protocol TOR &amp;lt;ref&amp;gt;https://www.torproject.org/docs/hidden-services.html.en&amp;lt;/ref&amp;gt; that operates within the anonymous distributed network of TOR &amp;lt;ref&amp;gt;https://www.torproject.org/about/overview.html.en#thesolution&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
Considering the wide variety of users and type of information that you can find inside the deep web, it is initially easier and safer to access it using the  '''TOR browser''' &amp;lt;Ref&amp;gt; https://www.torproject.org/projects/torbrowser.html.en &amp;lt;/ ref&amp;gt;, available for various operating systems. Alternatively, to maximize your security we recommend the use of '''TAILS''' &amp;lt;ref&amp;gt;https://tails.boum.org/&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Maybe you can ask yourself  if it is not indexed where to start?&lt;br /&gt;
&lt;br /&gt;
===Case A===&lt;br /&gt;
You get an .onion address. “.onion&amp;quot; is a special-use top level domain suffix designating an anonymous hidden service only reachable via the Tor network. Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed, Internet programs such as web browsers can access sites with .onion addresses by sending the request through the network of Tor servers. The purpose of using such a system is to make both the information provider and the person accessing the information more difficult to trace, whether by one another, by an intermediate network host, or by an outsider  &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/.onion&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
For instance, you receive:&lt;br /&gt;
 http://duskgytldkxiuqc6.onion&lt;br /&gt;
you need to change the  .onion for something like:&lt;br /&gt;
&lt;br /&gt;
.onion.to&lt;br /&gt;
&lt;br /&gt;
.onion.city&lt;br /&gt;
&lt;br /&gt;
.onion.cab&lt;br /&gt;
&lt;br /&gt;
or any other domain made available by the network of volunteers of TOR2web  &amp;lt;ref&amp;gt;https://tor2web.org/&amp;lt;/ref&amp;gt;.  &lt;br /&gt;
&lt;br /&gt;
and you need to open it up in the browser '''TOR'''.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
Deep_web2.png|Opening duskgytldkxiuqc6.onion in a common browser&lt;br /&gt;
Deep_web3.png|Opening duskgytldkxiuqc6.onion.to with TOR browser&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Case B===&lt;br /&gt;
&lt;br /&gt;
You want to look for a page.&lt;br /&gt;
&lt;br /&gt;
You can begin in:&lt;br /&gt;
http://deepweb.pw/&lt;br /&gt;
&lt;br /&gt;
This page can be opened in any browser, but you can only access .onion pages using the '''TOR''' browser. &lt;br /&gt;
&lt;br /&gt;
Here you can find interesting sites like the Hidden wiki.&lt;br /&gt;
&lt;br /&gt;
You can also look for information here:&lt;br /&gt;
 https://ahmia.fi/search/&lt;br /&gt;
&lt;br /&gt;
Or if you are interested in websites about leaks:&lt;br /&gt;
 https://en.wikipedia.org/wiki/GlobaLeaks#Implementations&lt;br /&gt;
&lt;br /&gt;
Other possible search places:&lt;br /&gt;
 http://3g2upl4pq6kufc4m.onion/&lt;br /&gt;
&lt;br /&gt;
 https://www.reddit.com//r/onions&lt;br /&gt;
&lt;br /&gt;
You should consider that the availability of information in many cases is temporary, so you will need to spend considerable time to get used to the deep web and search more fruitfully. Also,  language can be a limitation; before entering forums remember that they generally use specific jargon&amp;lt;ref&amp;gt;http://domekit.cc/survival-kit-in-the-deep-web/&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
===Case C===&lt;br /&gt;
You can also use the hidden services of Riseup&lt;br /&gt;
 https://help.riseup.net/en/tor&lt;br /&gt;
&lt;br /&gt;
==Adding data to the deep web==&lt;br /&gt;
&lt;br /&gt;
Now you can surf the deep web, but how do you add information?&lt;br /&gt;
&lt;br /&gt;
If you need to add a file you can use the Riseup '' Share '' service that lets you upload a file of up to 50mb for no more than a week. You can find the .onion.to league at:  https://help.riseup.net/en/tor&lt;br /&gt;
&lt;br /&gt;
[[File:Deep_web4.png|400px|center|alt= Riseup Services]]&lt;br /&gt;
&lt;br /&gt;
The second option is using zeronet.io. This tool allows you to publish open, free and uncensored blogs and it uses Bitcoin cryptography and the BitTorrent network.&lt;br /&gt;
&lt;br /&gt;
Although you can use this tool in different operating systems the option we recommend is '''zeronet + TAILS'''  (https://tails.boum.org/) because it represents s the safest method. However, with this approach you need to dedicate a little more time to its configuration since you must know how to enable ports on an internet modem.&lt;br /&gt;
&lt;br /&gt;
[[File:zeronet_logo.png|120px|none|alt=zeronet.io|ZeroNet]] &lt;br /&gt;
&lt;br /&gt;
What do you need?&lt;br /&gt;
&lt;br /&gt;
One TAILS USB with persistence activated.&lt;br /&gt;
&lt;br /&gt;
Enable the port  15441 of your modem&lt;br /&gt;
&lt;br /&gt;
1) You have login to a TAILS session using persistence and advanced settings to access the ''root'' terminal.&lt;br /&gt;
&lt;br /&gt;
2) In the terminal you need to write the following commands:&lt;br /&gt;
&lt;br /&gt;
To update and install the required dependencies:&lt;br /&gt;
&lt;br /&gt;
 $ sudo apt-get update&lt;br /&gt;
 $ sudo apt-get upgrade&lt;br /&gt;
 $ sudo apt-get install python-msgpack python-gevent&lt;br /&gt;
&lt;br /&gt;
For downloading zeronet:&lt;br /&gt;
&lt;br /&gt;
 $ wget https://github.com/HelloZeroNet/ZeroNet/archive/master.tar.gz&lt;br /&gt;
&lt;br /&gt;
To unzip the downloaded file:&lt;br /&gt;
&lt;br /&gt;
 $ tar xvpfz master.tar.gz&lt;br /&gt;
&lt;br /&gt;
To enter the file:&lt;br /&gt;
&lt;br /&gt;
 $ cd ZeroNet-master&lt;br /&gt;
&lt;br /&gt;
For starting:&lt;br /&gt;
&lt;br /&gt;
 $ python zeronet.py&lt;br /&gt;
&lt;br /&gt;
If this option does not work you need to check your IP&lt;br /&gt;
&lt;br /&gt;
 $ sudo ifconfig&lt;br /&gt;
&lt;br /&gt;
This command will tell you what your internet address (inet addr), for example in the image it is 10.14.241.166&lt;br /&gt;
[[File:ifconfig.png|400px|center|alt=Comando ifconfig]] &lt;br /&gt;
&lt;br /&gt;
 $ python zeronet.py --proxy 127.0.0.1:9050 --tor disable --ui_ip inet_addr&lt;br /&gt;
In the previous command you must replace inet_addr with the one that corresponds to your computer&lt;br /&gt;
&lt;br /&gt;
With those steps you will have started the services of zeronet&lt;br /&gt;
&lt;br /&gt;
3) In the browser '''TOR''' you need to open the options of '''Configuration''' and select ''Advanced'' where you will find the tab  '''Network''' and in the first point you need to go to '''Connection'''  '''Options''' and add in '''No proxi''' 127.0.0.1 or your own inet_addr&lt;br /&gt;
&lt;br /&gt;
[[File:Proxy_conf_tor.png|400px|center|alt=Configuration options for the TOR browser]]&lt;br /&gt;
&lt;br /&gt;
After you can open/&lt;br /&gt;
 http://inet_addr:43110/&lt;br /&gt;
for instance:&lt;br /&gt;
 http://127.0.0.1:43110&lt;br /&gt;
&lt;br /&gt;
And you will find the graphical interface&lt;br /&gt;
&lt;br /&gt;
[[File:zeronet.png|400px]]&lt;br /&gt;
&lt;br /&gt;
To create a new blog you only need to activate '''Zero blog''' and use the tool for cloning.&lt;br /&gt;
[[File:Zeronet2.png|400px]] &lt;br /&gt;
&lt;br /&gt;
'''Note:'''&lt;br /&gt;
&lt;br /&gt;
You will only be able to upload information to the network zeronet if your port 15441 is enabled&lt;br /&gt;
You can see more information about set up and configuration here [https://github.com/HelloZeroNet/ZeroNet ZeroNet]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== What is the deep web??==&lt;br /&gt;
&lt;br /&gt;
The deep web refers to all the information that is in the world wide we but is not indexed, so it is not possible to access it using search engines such as Google &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Deep_web&amp;lt;/ref&amp;gt;. Web indexing (or Internet indexing) refers to various methods for indexing the contents of a website or of the Internet as a whole. Individual websites or intranets may use a &amp;quot;back-of-the-book&amp;quot; index, while search engines usually use keywords and metadata to provide a more useful vocabulary for Internet or onsite searching. With the increase in the number of periodicals that have articles online, web indexing is also becoming important for periodical websites  &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Web_indexing&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:deep_web.png|400px|center|alt=Web profunda]]&lt;br /&gt;
&lt;br /&gt;
According to Wikipedia, &amp;quot;The portion of the web that is indexed by standard search engines is known as the surface web. As of 2001, the deep web was several orders of magnitude larger than the surface web. An analogy of an iceberg used by Denis Shestakov represents the division between surface web and deep web respectively: It is impossible to measure, and harsh to put estimates on, the size of the deep web because the majority of the information is hidden or locked inside databases. Early estimates suggested that the deep web is 400 to 550 times larger than the surface web. However, since more information and sites are always being added, it can be assumed that the deep web is growing exponentially at a rate that cannot be quantified.”&lt;br /&gt;
&lt;br /&gt;
A common confusions is to mix up the deep web and the dark web; the latter corresponds to a part of the deep web, which besides not being indexed, has been hidden using methods such as masking IP and/or requiring special permissions or the use of specific software to access it &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Dark_web&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
But if it is not indexed, how do we access it? Below we describe two ways you can immerse yourself in the deep web.&lt;br /&gt;
&lt;br /&gt;
== Navigating the deep web using Tor==&lt;br /&gt;
&lt;br /&gt;
[[File:Tor-logo-2011-flat.svg|120px|left|alt=TOR]]&lt;br /&gt;
&lt;br /&gt;
One of the easiest ways is to use the  hidden service protocol TOR &amp;lt;ref&amp;gt;https://www.torproject.org/docs/hidden-services.html.en&amp;lt;/ref&amp;gt; that operates within the anonymous distributed network of TOR &amp;lt;ref&amp;gt;https://www.torproject.org/about/overview.html.en#thesolution&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
Considering the wide variety of users and type of information that you can find inside the deep web, it is initially easier and safer to access it using the  '''TOR browser''' &amp;lt;Ref&amp;gt; https://www.torproject.org/projects/torbrowser.html.en &amp;lt;/ ref&amp;gt;, available for various operating systems. Alternatively, to maximize your security we recommend the use of '''TAILS''' &amp;lt;ref&amp;gt;https://tails.boum.org/&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Maybe you can ask yourself  if it is not indexed where to start?&lt;br /&gt;
&lt;br /&gt;
===Case A===&lt;br /&gt;
You get an .onion address. “.onion&amp;quot; is a special-use top level domain suffix designating an anonymous hidden service only reachable via the Tor network. Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed, Internet programs such as web browsers can access sites with .onion addresses by sending the request through the network of Tor servers. The purpose of using such a system is to make both the information provider and the person accessing the information more difficult to trace, whether by one another, by an intermediate network host, or by an outsider  &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/.onion&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
For instance, you receive:&lt;br /&gt;
 http://duskgytldkxiuqc6.onion&lt;br /&gt;
you need to change the  .onion for something like:&lt;br /&gt;
&lt;br /&gt;
.onion.to&lt;br /&gt;
&lt;br /&gt;
.onion.city&lt;br /&gt;
&lt;br /&gt;
.onion.cab&lt;br /&gt;
&lt;br /&gt;
or any other domain made available by the network of volunteers of TOR2web  &amp;lt;ref&amp;gt;https://tor2web.org/&amp;lt;/ref&amp;gt;.  &lt;br /&gt;
&lt;br /&gt;
and you need to open it up in the browser '''TOR'''.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
Deep_web2.png|Opening duskgytldkxiuqc6.onion in a common browser&lt;br /&gt;
Deep_web3.png|Opening duskgytldkxiuqc6.onion.to with TOR browser&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Case B===&lt;br /&gt;
&lt;br /&gt;
You want to look for a page.&lt;br /&gt;
&lt;br /&gt;
You can begin in:&lt;br /&gt;
http://deepweb.pw/&lt;br /&gt;
&lt;br /&gt;
This page can be opened in any browser, but you can only access .onion pages using the '''TOR''' browser. &lt;br /&gt;
&lt;br /&gt;
Here you can find interesting sites like the Hidden wiki.&lt;br /&gt;
&lt;br /&gt;
You can also look for information here:&lt;br /&gt;
 https://ahmia.fi/search/&lt;br /&gt;
&lt;br /&gt;
Or if you are interested in websites about leaks:&lt;br /&gt;
 https://en.wikipedia.org/wiki/GlobaLeaks#Implementations&lt;br /&gt;
&lt;br /&gt;
Other possible search places:&lt;br /&gt;
 http://3g2upl4pq6kufc4m.onion/&lt;br /&gt;
&lt;br /&gt;
 https://www.reddit.com//r/onions&lt;br /&gt;
&lt;br /&gt;
You should consider that the availability of information in many cases is temporary, so you will need to spend considerable time to get used to the deep web and search more fruitfully. Also,  language can be a limitation; before entering forums remember that they generally use specific jargon&amp;lt;ref&amp;gt;http://domekit.cc/survival-kit-in-the-deep-web/&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
===Case C===&lt;br /&gt;
You can also use the hidden services of Riseup&lt;br /&gt;
 https://help.riseup.net/en/tor&lt;br /&gt;
&lt;br /&gt;
==Adding data to the deep web==&lt;br /&gt;
&lt;br /&gt;
Now you can surf the deep web, but how do you add information?&lt;br /&gt;
&lt;br /&gt;
If you need to add a file you can use the Riseup '' Share '' service that lets you upload a file of up to 50mb for no more than a week. You can find the .onion.to league at:  https://help.riseup.net/en/tor&lt;br /&gt;
&lt;br /&gt;
[[File:Deep_web4.png|400px|center|alt= Riseup Services]]&lt;br /&gt;
&lt;br /&gt;
The second option is using zeronet.io. This tool allows you to publish open, free and uncensored blogs and it uses Bitcoin cryptography and the BitTorrent network.&lt;br /&gt;
&lt;br /&gt;
Although you can use this tool in different operating systems the option we recommend is '''zeronet + TAILS'''  (https://tails.boum.org/) because it represents s the safest method. However, with this approach you need to dedicate a little more time to its configuration since you must know how to enable ports on an internet modem.&lt;br /&gt;
&lt;br /&gt;
[[File:zeronet_logo.png|120px|none|alt=zeronet.io|ZeroNet]] &lt;br /&gt;
&lt;br /&gt;
What do you need?&lt;br /&gt;
&lt;br /&gt;
One TAILS USB with persistence activated.&lt;br /&gt;
&lt;br /&gt;
Enable the port  15441 of your modem&lt;br /&gt;
&lt;br /&gt;
1) You have login to a TAILS session using persistence and advanced settings to access the ''root'' terminal.&lt;br /&gt;
&lt;br /&gt;
2) In the terminal you need to write the following commands:&lt;br /&gt;
&lt;br /&gt;
To update and install the required dependencies:&lt;br /&gt;
&lt;br /&gt;
 $ sudo apt-get update&lt;br /&gt;
 $ sudo apt-get upgrade&lt;br /&gt;
 $ sudo apt-get install python-msgpack python-gevent&lt;br /&gt;
&lt;br /&gt;
For downloading zeronet:&lt;br /&gt;
&lt;br /&gt;
 $ wget https://github.com/HelloZeroNet/ZeroNet/archive/master.tar.gz&lt;br /&gt;
&lt;br /&gt;
To unzip the downloaded file:&lt;br /&gt;
&lt;br /&gt;
 $ tar xvpfz master.tar.gz&lt;br /&gt;
&lt;br /&gt;
To enter the file:&lt;br /&gt;
&lt;br /&gt;
 $ cd ZeroNet-master&lt;br /&gt;
&lt;br /&gt;
For starting:&lt;br /&gt;
&lt;br /&gt;
 $ python zeronet.py&lt;br /&gt;
&lt;br /&gt;
If this option does not work you need to check your IP&lt;br /&gt;
&lt;br /&gt;
 $ sudo ifconfig&lt;br /&gt;
&lt;br /&gt;
This command will tell you what your internet address (inet addr), for example in the image it is 10.14.241.166&lt;br /&gt;
[[File:ifconfig.png|400px|center|alt=Comando ifconfig]] &lt;br /&gt;
&lt;br /&gt;
 $ python zeronet.py --proxy 127.0.0.1:9050 --tor disable --ui_ip inet_addr&lt;br /&gt;
In the previous command you must replace inet_addr with the one that corresponds to your computer&lt;br /&gt;
&lt;br /&gt;
With those steps you will have started the services of zeronet&lt;br /&gt;
&lt;br /&gt;
3) In the browser '''TOR''' you need to open the options of '''Configuration''' and select ''Advanced'' where you will find the tab  '''Network''' and in the first point you need to go to '''Connection'''  '''Options''' and add in '''No proxi''' 127.0.0.1 or your own inet_addr&lt;br /&gt;
&lt;br /&gt;
[[File:Proxy_conf_tor.png|400px|center|alt=Configuration options for the TOR browser]]&lt;br /&gt;
&lt;br /&gt;
After you can open/&lt;br /&gt;
 http://inet_addr:43110/&lt;br /&gt;
for instance:&lt;br /&gt;
 http://127.0.0.1:43110&lt;br /&gt;
&lt;br /&gt;
And you will find the graphical interface&lt;br /&gt;
&lt;br /&gt;
[[File:zeronet.png|400px]]&lt;br /&gt;
&lt;br /&gt;
To create a new blog you only need to activate '''Zero blog''' and use the tool for cloning.&lt;br /&gt;
[[File:Zeronet2.png|400px]] &lt;br /&gt;
&lt;br /&gt;
'''Note:'''&lt;br /&gt;
&lt;br /&gt;
You will only be able to upload information to the network zeronet if your port 15441 is enabled&lt;br /&gt;
You can see more information about set up and configuration here [https://github.com/HelloZeroNet/ZeroNet ZeroNet]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Deep_web&amp;diff=8961</id>
		<title>Deep web</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Deep_web&amp;diff=8961"/>
				<updated>2017-03-16T13:51:50Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== What is the deep web??==&lt;br /&gt;
&lt;br /&gt;
The deep web refers to all the information that is in the world wide we but is not indexed so it is not possible to access it using search engines like Google &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Deep_web&amp;lt;/ref&amp;gt;. Web indexing (or Internet indexing) refers to various methods for indexing the contents of a website or of the Internet as a whole. Individual websites or intranets may use a back-of-the-book index, while search engines usually use keywords and metadata to provide a more useful vocabulary for Internet or onsite searching. With the increase in the number of periodicals that have articles online, web indexing is also becoming important for periodical websites  &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Web_indexing&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:deep_web.png|400px|center|alt=Web profunda]]&lt;br /&gt;
&lt;br /&gt;
According to the wikipedia &amp;quot;The portion of the web that is indexed by standard search engines is known as the surface web. As of 2001, the deep web was several orders of magnitude larger than the surface web. An analogy of an iceberg used by Denis Shestakov represents the division between surface web and deep web respectively: It is impossible to measure, and harsh to put estimates on, the size of the deep web because the majority of the information is hidden or locked inside databases. Early estimates suggested that the deep web is 400 to 550 times larger than the surface web. However, since more information and sites are always being added, it can be assumed that the deep web is growing exponentially at a rate that cannot be quantified.”&lt;br /&gt;
&lt;br /&gt;
A common confusions is to mix up the deep web and the dark web. Latter corresponds to a part of the deep web, which besides not being indexed has been hidden using methods such as masking IP and/or requiring special permissions or the use of specific software to access it &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Dark_web&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
But if it is not indexed, how do we access it? Below we describe two ways you can immerse yourself in the deep web.&lt;br /&gt;
&lt;br /&gt;
== Navigating the deep web using Tor==&lt;br /&gt;
&lt;br /&gt;
[[File:Tor-logo-2011-flat.svg|120px|left|alt=TOR]]&lt;br /&gt;
&lt;br /&gt;
One of the easiest ways is to use the  hidden service protocol TOR &amp;lt;ref&amp;gt;https://www.torproject.org/docs/hidden-services.html.en&amp;lt;/ref&amp;gt; that operates within the anonymous distributed network of TOR &amp;lt;ref&amp;gt;https://www.torproject.org/about/overview.html.en#thesolution&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
Considering the wide variety of users and type of information that you can find inside the deep web, it is initially easier and safer to access it using the  '''TOR browser''' &amp;lt;Ref&amp;gt; https://www.torproject.org/projects/torbrowser.html.en &amp;lt;/ ref&amp;gt; that is available for various operating systems. Alternatively to maximize your security we recommend the use of '''TAILS''' &amp;lt;ref&amp;gt;https://tails.boum.org/&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Maybe you can ask yourself  if it is not indexed where to start?&lt;br /&gt;
&lt;br /&gt;
===Case A===&lt;br /&gt;
You get an .onion address. Those are “.onion is a special-use top level domain suffix designating an anonymous hidden service reachable via the Tor network. Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed, Internet programs such as web browsers can access sites with .onion addresses by sending the request through the network of Tor servers. The purpose of using such a system is to make both the information provider and the person accessing the information more difficult to trace, whether by one another, by an intermediate network host, or by an outsider  &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/.onion&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
For instance, you receive:&lt;br /&gt;
 http://duskgytldkxiuqc6.onion&lt;br /&gt;
you need to change the  .onion for something like:&lt;br /&gt;
&lt;br /&gt;
.onion.to&lt;br /&gt;
&lt;br /&gt;
.onion.city&lt;br /&gt;
&lt;br /&gt;
.onion.cab&lt;br /&gt;
&lt;br /&gt;
or any other domain made available by the network of volunteers of TOR2web  &amp;lt;ref&amp;gt;https://tor2web.org/&amp;lt;/ref&amp;gt;.  &lt;br /&gt;
&lt;br /&gt;
and you need to open it up in the browser '''TOR'''.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
Deep_web2.png|Opening duskgytldkxiuqc6.onion in a common browser&lt;br /&gt;
Deep_web3.png|Opening duskgytldkxiuqc6.onion.to with TOR browser&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Case B===&lt;br /&gt;
&lt;br /&gt;
You want to look for a page.&lt;br /&gt;
&lt;br /&gt;
You can begin in:&lt;br /&gt;
http://deepweb.pw/&lt;br /&gt;
&lt;br /&gt;
This page could be opened in any browser but only using '''TOR''' browser you will be able to access  .onion pages. &lt;br /&gt;
&lt;br /&gt;
There you can find interesting sites like the Hidden wiki.&lt;br /&gt;
&lt;br /&gt;
You can also look for information here:&lt;br /&gt;
 https://ahmia.fi/search/&lt;br /&gt;
&lt;br /&gt;
Or if you are interested in websites about leaks:&lt;br /&gt;
 https://en.wikipedia.org/wiki/GlobaLeaks#Implementations&lt;br /&gt;
&lt;br /&gt;
Other possible search places:&lt;br /&gt;
 http://3g2upl4pq6kufc4m.onion/&lt;br /&gt;
&lt;br /&gt;
 https://www.reddit.com//r/onions&lt;br /&gt;
&lt;br /&gt;
You should consider that the availability of information in many cases is temporary, so you will need to spend considerable time to get used to the deep web and search more fruitfully. Also the language can be a limitation and before entering forums remember that they generally use specific jargon&amp;lt;ref&amp;gt;http://domekit.cc/survival-kit-in-the-deep-web/&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
===Case C===&lt;br /&gt;
You can also use the hidden services of Riseup&lt;br /&gt;
 https://help.riseup.net/en/tor&lt;br /&gt;
&lt;br /&gt;
==Adding data to the deep web==&lt;br /&gt;
&lt;br /&gt;
Well now you surf the web deep but how do you add information?&lt;br /&gt;
&lt;br /&gt;
If you need to add a file you can use the services '' Share '' of Riseup that let you upload a file up to 50mb for no more than a week. You can find the .onion.to league at:  https://help.riseup.net/en/tor&lt;br /&gt;
&lt;br /&gt;
[[File:Deep_web4.png|400px|center|alt= Riseup Services]]&lt;br /&gt;
&lt;br /&gt;
The second option is using zeronet.io. This tool allows you to publish open, free and uncensored blogs and it uses the Bitcoin cryptography and the BitTorrent network.&lt;br /&gt;
&lt;br /&gt;
Although you can use this tool in different operating systems the option we recommend is '''zeronet + TAILS'''  (https://tails.boum.org/) because it represents the safest form, however it requires that you dedicate a little more time to its configuration since you must know how to enable ports in the internet modem.&lt;br /&gt;
&lt;br /&gt;
[[File:zeronet_logo.png|120px|none|alt=zeronet.io|ZeroNet]] &lt;br /&gt;
&lt;br /&gt;
What do you need?&lt;br /&gt;
&lt;br /&gt;
One USB with TAILS and persistencia activated.&lt;br /&gt;
&lt;br /&gt;
Enable the port  15441 of your modem&lt;br /&gt;
&lt;br /&gt;
1) You have login to a TAILS session using persistence and advanced settings to access the ''root'' terminal.&lt;br /&gt;
&lt;br /&gt;
2) In the terminal you need to write the following commands:&lt;br /&gt;
&lt;br /&gt;
To update and install the required dependencies:&lt;br /&gt;
&lt;br /&gt;
 $ sudo apt-get update&lt;br /&gt;
 $ sudo apt-get upgrade&lt;br /&gt;
 $ sudo apt-get install python-msgpack python-gevent&lt;br /&gt;
&lt;br /&gt;
For downloading zeronet:&lt;br /&gt;
&lt;br /&gt;
 $ wget https://github.com/HelloZeroNet/ZeroNet/archive/master.tar.gz&lt;br /&gt;
&lt;br /&gt;
To unzip the downloaded file:&lt;br /&gt;
&lt;br /&gt;
 $ tar xvpfz master.tar.gz&lt;br /&gt;
&lt;br /&gt;
To enter the file:&lt;br /&gt;
&lt;br /&gt;
 $ cd ZeroNet-master&lt;br /&gt;
&lt;br /&gt;
For starting:&lt;br /&gt;
&lt;br /&gt;
 $ python zeronet.py&lt;br /&gt;
&lt;br /&gt;
If this option does not work you need to check your IP&lt;br /&gt;
&lt;br /&gt;
 $ sudo ifconfig&lt;br /&gt;
&lt;br /&gt;
This command will tell you what your internet address (inet addr), for example in the image it is 10.14.241.166&lt;br /&gt;
[[File:ifconfig.png|400px|center|alt=Comando ifconfig]] &lt;br /&gt;
&lt;br /&gt;
 $ python zeronet.py --proxy 127.0.0.1:9050 --tor disable --ui_ip inet_addr&lt;br /&gt;
In the previous command you must replace inet_addr with the one that corresponds to your computer&lt;br /&gt;
&lt;br /&gt;
With those steps you will have started the services of zeronet&lt;br /&gt;
&lt;br /&gt;
3) In the browser '''TOR''' you need to open the ptions of '''Configuration''' and select ''Advanced'' where you will find the tab  '''Network''' and in the first point you need to go to '''Connection'''  '''Options''' and add in '''No proxi''' 127.0.0.1 or your own inet_addr&lt;br /&gt;
&lt;br /&gt;
[[File:Proxy_conf_tor.png|400px|center|alt=Configuration options for the TOR browser]]&lt;br /&gt;
&lt;br /&gt;
After you can open/&lt;br /&gt;
 http://inet_addr:43110/&lt;br /&gt;
for instance:&lt;br /&gt;
 http://127.0.0.1:43110&lt;br /&gt;
&lt;br /&gt;
And you will find the graphical interface&lt;br /&gt;
&lt;br /&gt;
[[File:zeronet.png|400px]]&lt;br /&gt;
&lt;br /&gt;
To create a new blog you only need to activate '''Zero blog''' and use the tool for cloning.&lt;br /&gt;
[[File:Zeronet2.png|400px]] &lt;br /&gt;
&lt;br /&gt;
'''Note:'''&lt;br /&gt;
&lt;br /&gt;
You will only be able to upload information to the network zeronet if your port 15441 is enabled&lt;br /&gt;
You can see more information about set up and configuration here [https://github.com/HelloZeroNet/ZeroNet ZeroNet]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== What is the deep web??==&lt;br /&gt;
&lt;br /&gt;
The deep web refers to all the information that is in the world wide we but is not indexed, so it is not possible to access it using search engines such as Google &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Deep_web&amp;lt;/ref&amp;gt;. Web indexing (or Internet indexing) refers to various methods for indexing the contents of a website or of the Internet as a whole. Individual websites or intranets may use a &amp;quot;back-of-the-book&amp;quot; index, while search engines usually use keywords and metadata to provide a more useful vocabulary for Internet or onsite searching. With the increase in the number of periodicals that have articles online, web indexing is also becoming important for periodical websites  &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Web_indexing&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:deep_web.png|400px|center|alt=Web profunda]]&lt;br /&gt;
&lt;br /&gt;
According to Wikipedia, &amp;quot;The portion of the web that is indexed by standard search engines is known as the surface web. As of 2001, the deep web was several orders of magnitude larger than the surface web. An analogy of an iceberg used by Denis Shestakov represents the division between surface web and deep web respectively: It is impossible to measure, and harsh to put estimates on, the size of the deep web because the majority of the information is hidden or locked inside databases. Early estimates suggested that the deep web is 400 to 550 times larger than the surface web. However, since more information and sites are always being added, it can be assumed that the deep web is growing exponentially at a rate that cannot be quantified.”&lt;br /&gt;
&lt;br /&gt;
A common confusions is to mix up the deep web and the dark web; the latter corresponds to a part of the deep web, which besides not being indexed, has been hidden using methods such as masking IP and/or requiring special permissions or the use of specific software to access it &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Dark_web&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
But if it is not indexed, how do we access it? Below we describe two ways you can immerse yourself in the deep web.&lt;br /&gt;
&lt;br /&gt;
== Navigating the deep web using Tor==&lt;br /&gt;
&lt;br /&gt;
[[File:Tor-logo-2011-flat.svg|120px|left|alt=TOR]]&lt;br /&gt;
&lt;br /&gt;
One of the easiest ways is to use the  hidden service protocol TOR &amp;lt;ref&amp;gt;https://www.torproject.org/docs/hidden-services.html.en&amp;lt;/ref&amp;gt; that operates within the anonymous distributed network of TOR &amp;lt;ref&amp;gt;https://www.torproject.org/about/overview.html.en#thesolution&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
Considering the wide variety of users and type of information that you can find inside the deep web, it is initially easier and safer to access it using the  '''TOR browser''' &amp;lt;Ref&amp;gt; https://www.torproject.org/projects/torbrowser.html.en &amp;lt;/ ref&amp;gt;, available for various operating systems. Alternatively, to maximize your security we recommend the use of '''TAILS''' &amp;lt;ref&amp;gt;https://tails.boum.org/&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Maybe you can ask yourself  if it is not indexed where to start?&lt;br /&gt;
&lt;br /&gt;
===Case A===&lt;br /&gt;
You get an .onion address. “.onion&amp;quot; is a special-use top level domain suffix designating an anonymous hidden service only reachable via the Tor network. Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed, Internet programs such as web browsers can access sites with .onion addresses by sending the request through the network of Tor servers. The purpose of using such a system is to make both the information provider and the person accessing the information more difficult to trace, whether by one another, by an intermediate network host, or by an outsider  &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/.onion&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
For instance, you receive:&lt;br /&gt;
 http://duskgytldkxiuqc6.onion&lt;br /&gt;
you need to change the  .onion for something like:&lt;br /&gt;
&lt;br /&gt;
.onion.to&lt;br /&gt;
&lt;br /&gt;
.onion.city&lt;br /&gt;
&lt;br /&gt;
.onion.cab&lt;br /&gt;
&lt;br /&gt;
or any other domain made available by the network of volunteers of TOR2web  &amp;lt;ref&amp;gt;https://tor2web.org/&amp;lt;/ref&amp;gt;.  &lt;br /&gt;
&lt;br /&gt;
and you need to open it up in the browser '''TOR'''.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
Deep_web2.png|Opening duskgytldkxiuqc6.onion in a common browser&lt;br /&gt;
Deep_web3.png|Opening duskgytldkxiuqc6.onion.to with TOR browser&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Case B===&lt;br /&gt;
&lt;br /&gt;
You want to look for a page.&lt;br /&gt;
&lt;br /&gt;
You can begin in:&lt;br /&gt;
http://deepweb.pw/&lt;br /&gt;
&lt;br /&gt;
This page can be opened in any browser, but you can only access .onion pages using the '''TOR''' browser. &lt;br /&gt;
&lt;br /&gt;
Here you can find interesting sites like the Hidden wiki.&lt;br /&gt;
&lt;br /&gt;
You can also look for information here:&lt;br /&gt;
 https://ahmia.fi/search/&lt;br /&gt;
&lt;br /&gt;
Or if you are interested in websites about leaks:&lt;br /&gt;
 https://en.wikipedia.org/wiki/GlobaLeaks#Implementations&lt;br /&gt;
&lt;br /&gt;
Other possible search places:&lt;br /&gt;
 http://3g2upl4pq6kufc4m.onion/&lt;br /&gt;
&lt;br /&gt;
 https://www.reddit.com//r/onions&lt;br /&gt;
&lt;br /&gt;
You should consider that the availability of information in many cases is temporary, so you will need to spend considerable time to get used to the deep web and search more fruitfully. Also,  language can be a limitation; before entering forums remember that they generally use specific jargon&amp;lt;ref&amp;gt;http://domekit.cc/survival-kit-in-the-deep-web/&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
===Case C===&lt;br /&gt;
You can also use the hidden services of Riseup&lt;br /&gt;
 https://help.riseup.net/en/tor&lt;br /&gt;
&lt;br /&gt;
==Adding data to the deep web==&lt;br /&gt;
&lt;br /&gt;
Now you can surf the deep web, but how do you add information?&lt;br /&gt;
&lt;br /&gt;
If you need to add a file you can use the Riseup '' Share '' service that lets you upload a file of up to 50mb for no more than a week. You can find the .onion.to league at:  https://help.riseup.net/en/tor&lt;br /&gt;
&lt;br /&gt;
[[File:Deep_web4.png|400px|center|alt= Riseup Services]]&lt;br /&gt;
&lt;br /&gt;
The second option is using zeronet.io. This tool allows you to publish open, free and uncensored blogs and it uses Bitcoin cryptography and the BitTorrent network.&lt;br /&gt;
&lt;br /&gt;
Although you can use this tool in different operating systems the option we recommend is '''zeronet + TAILS'''  (https://tails.boum.org/) because it represents s the safest method. However, with this approach you need to dedicate a little more time to its configuration since you must know how to enable ports on an internet modem.&lt;br /&gt;
&lt;br /&gt;
[[File:zeronet_logo.png|120px|none|alt=zeronet.io|ZeroNet]] &lt;br /&gt;
&lt;br /&gt;
What do you need?&lt;br /&gt;
&lt;br /&gt;
One TAILS USB with persistence activated.&lt;br /&gt;
&lt;br /&gt;
Enable the port  15441 of your modem&lt;br /&gt;
&lt;br /&gt;
1) You have login to a TAILS session using persistence and advanced settings to access the ''root'' terminal.&lt;br /&gt;
&lt;br /&gt;
2) In the terminal you need to write the following commands:&lt;br /&gt;
&lt;br /&gt;
To update and install the required dependencies:&lt;br /&gt;
&lt;br /&gt;
 $ sudo apt-get update&lt;br /&gt;
 $ sudo apt-get upgrade&lt;br /&gt;
 $ sudo apt-get install python-msgpack python-gevent&lt;br /&gt;
&lt;br /&gt;
For downloading zeronet:&lt;br /&gt;
&lt;br /&gt;
 $ wget https://github.com/HelloZeroNet/ZeroNet/archive/master.tar.gz&lt;br /&gt;
&lt;br /&gt;
To unzip the downloaded file:&lt;br /&gt;
&lt;br /&gt;
 $ tar xvpfz master.tar.gz&lt;br /&gt;
&lt;br /&gt;
To enter the file:&lt;br /&gt;
&lt;br /&gt;
 $ cd ZeroNet-master&lt;br /&gt;
&lt;br /&gt;
For starting:&lt;br /&gt;
&lt;br /&gt;
 $ python zeronet.py&lt;br /&gt;
&lt;br /&gt;
If this option does not work you need to check your IP&lt;br /&gt;
&lt;br /&gt;
 $ sudo ifconfig&lt;br /&gt;
&lt;br /&gt;
This command will tell you what your internet address (inet addr), for example in the image it is 10.14.241.166&lt;br /&gt;
[[File:ifconfig.png|400px|center|alt=Comando ifconfig]] &lt;br /&gt;
&lt;br /&gt;
 $ python zeronet.py --proxy 127.0.0.1:9050 --tor disable --ui_ip inet_addr&lt;br /&gt;
In the previous command you must replace inet_addr with the one that corresponds to your computer&lt;br /&gt;
&lt;br /&gt;
With those steps you will have started the services of zeronet&lt;br /&gt;
&lt;br /&gt;
3) In the browser '''TOR''' you need to open the options of '''Configuration''' and select ''Advanced'' where you will find the tab  '''Network''' and in the first point you need to go to '''Connection'''  '''Options''' and add in '''No proxi''' 127.0.0.1 or your own inet_addr&lt;br /&gt;
&lt;br /&gt;
[[File:Proxy_conf_tor.png|400px|center|alt=Configuration options for the TOR browser]]&lt;br /&gt;
&lt;br /&gt;
After you can open/&lt;br /&gt;
 http://inet_addr:43110/&lt;br /&gt;
for instance:&lt;br /&gt;
 http://127.0.0.1:43110&lt;br /&gt;
&lt;br /&gt;
And you will find the graphical interface&lt;br /&gt;
&lt;br /&gt;
[[File:zeronet.png|400px]]&lt;br /&gt;
&lt;br /&gt;
To create a new blog you only need to activate '''Zero blog''' and use the tool for cloning.&lt;br /&gt;
[[File:Zeronet2.png|400px]] &lt;br /&gt;
&lt;br /&gt;
'''Note:'''&lt;br /&gt;
&lt;br /&gt;
You will only be able to upload information to the network zeronet if your port 15441 is enabled&lt;br /&gt;
You can see more information about set up and configuration here [https://github.com/HelloZeroNet/ZeroNet ZeroNet]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Detect_false_mobile_antennas&amp;diff=8960</id>
		<title>Detect false mobile antennas</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Detect_false_mobile_antennas&amp;diff=8960"/>
				<updated>2017-03-16T13:49:51Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== The electromagnetic spectrum ==&lt;br /&gt;
The electromagnetic spectrum or electric radio spectrum is not something material, but the space that is in the air that goes from the ground to the highest part of the sky. In this space, bands frequencies through which airplanes, wi-fi, bluetooth, walkie talkies, radios, telephones communicate are organized. The fact that our phones can be 2G, 3G, 4G means that they are using different bands of the electromagnetic space, through which the information circulates.&lt;br /&gt;
&lt;br /&gt;
For more information about the electromagnetic space:&lt;br /&gt;
https://imagine.gsfc.nasa.gov/science/toolbox/emspectrum1.html&lt;br /&gt;
https://en.wikipedia.org/wiki/Electromagnetic_spectrum&lt;br /&gt;
&lt;br /&gt;
== What is a fake cell tower?==&lt;br /&gt;
Fake cell towers (also known as IMSI catcher) are devices designed to intercept the traffic of a mobile phone and track the movements of the user's phone &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IMSI-catcher &amp;lt;/ref&amp;gt; pretending to be a &amp;quot;legitimate&amp;quot; cell tower &amp;lt;ref&amp;gt;https://www.eff.org/sls/tech/cell-site-simulators &amp;lt;/ref&amp;gt;.&lt;br /&gt;
[[File:Imsi-catcher.png|thumb|none|alt=Esquema torre falsa.|Esquema de una torre falsa de celular (modificado de [http://cybernc.com/les-imsi-catchers/ Henri-Olivier]).]]&lt;br /&gt;
&lt;br /&gt;
By the way they work IMSI catcher are considered a &amp;quot;man in the middle&amp;quot; attack &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Man-in-the-middle_attack&amp;lt;/ref&amp;gt;. This is defined as an attack that acquires the ability to read, insert and modify at will, messages between two parties without any of them knowing that the link between them has been violated. The attacker should be able to observe and intercept messages between the two victims &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IntermediateAccess &amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There is evidence that such devices have been used for surveillance purposes, for example in Ukraine the mobile phones of those attending a large demonstration were tracked and then massively received a text message stating &amp;quot;Dear subscriber, you have been registered As a participant in a mass disturbance &amp;quot;&amp;lt;ref&amp;gt;https://antivigilancia.org/es/2015/06/la-vigilancia-y-la-protesta-social/ &amp;lt;/ref&amp;gt;. In Latin America, it is known that governments like Mexico and Colombia have bought such devices.&lt;br /&gt;
&lt;br /&gt;
Unfortunately fake cell towers are becoming easier to get and their price can be as low as $ 500. Depending on the model there is evidence that not only can intercept the traffic of a phone but also can also inject malware.&lt;br /&gt;
&lt;br /&gt;
'''Bold text'''==How to detect them? ==&lt;br /&gt;
&lt;br /&gt;
A first step would be to have a database of the &amp;quot;legitimate&amp;quot; cell towers and the list of legitimate companies that provide these services and have the necessary operating permits. There are some databases such as:  http://opencellid.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Opencell.png|thumbnail|center|Torres en en América Latina]]&lt;br /&gt;
&lt;br /&gt;
There is also information about the frequencies where they should operate:&lt;br /&gt;
http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
[[File:Frecuencia.png|thumbnail|center|63/5000&lt;br /&gt;
Example of frequencies in which cellular telephony can operate]]&lt;br /&gt;
&lt;br /&gt;
And you can have a look at the development of the GSM network:&lt;br /&gt;
 http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
There are also some applications that can be downloaded from the following free app repository:&lt;br /&gt;
F-Droid is a software repository (or &amp;quot;app store&amp;quot;) for Android applications, similar to the Google Play store. The main repository, hosted by the project, contains only apps which are free software. Applications can be browsed and installed from the F-Droid website or client app without the need to register for an account. &amp;quot;Anti-features&amp;quot; such as advertising, user tracking, or dependence on non-free software are flagged in app descriptions.[3] The website also offers the source code of applications it hosts as well as the software running the F-Droid server, allowing anyone to set up their own app repository.&lt;br /&gt;
&lt;br /&gt;
In order to detect possible false antennas, you can download from F-Droid the following applications:&lt;br /&gt;
&lt;br /&gt;
[http://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/ Android IMSI Catcher Detector]&lt;br /&gt;
&lt;br /&gt;
[[File:AIMSICD-Teaser.png|400px|thumbnail|center|AIMSICD]]&lt;br /&gt;
&lt;br /&gt;
Android IMSI Catcher Detector attempts to detect IMSI-Catchers through detection methods such as: Check Tower Information Consistency,   Check LAC/Cell ID Consistency, check Neighbouring Cell Info, prevent silent app installations, monitor Signal Strength, detect silent SMS and detect FemtoCells&lt;br /&gt;
&lt;br /&gt;
[https://opensource.srlabs.de/projects/snoopsnitch Snoopsnitch]&lt;br /&gt;
&lt;br /&gt;
[[File:Sc catcher hour.png|200px|thumbnail|center|Snoopsnitch]]&lt;br /&gt;
&lt;br /&gt;
SnoopSnitch is an Android app that collects and analyzes mobile radio data to make you aware of your mobile network security and to warn you about threats like fake base stations (IMSI catchers), user tracking and over-the-air updates. With SnoopSnitch you can use the data collected in the GSM Security Map at gsmmap.org and contribute your own data to GSM Map.  This application currently only works on Android phones with a Qualcomm chipset and a stock Android ROM (or a suitable custom ROM with Qualcomm DIAG driver). It requires root priviliges to capture mobile network data.&lt;br /&gt;
&lt;br /&gt;
== How to protect yourself from fake cell towers?==&lt;br /&gt;
&lt;br /&gt;
If your phone allows it you can change its configuration options so that it does not connect to all available cell towers. For example on an Android phone you can go to: Configuration &amp;gt;   Wireless and networks  &amp;gt; More configuration &amp;gt; Mobile networks and there you can change &amp;gt; Network preferences  GSM/UTMS for using 3G or 4G if your smart-phone allows it and also choose for &amp;gt; Network operators &amp;gt; Choosing manually the antennas to connect. &lt;br /&gt;
&lt;br /&gt;
You can also isolate your mobile using a Faraday phone pouch, please read this other tutorial on the topic &amp;lt;ref&amp;gt;https://gendersec.tacticaltech.org/wiki/index.php/Faraday_Phone_Pouch&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
-Tela_y_proceso_de_bolsa_por_killyourphone-com.jpg|Phone Pouch&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Where can I see more information?==&lt;br /&gt;
&lt;br /&gt;
http://wiki.labomedia.org/index.php/GSM&lt;br /&gt;
https://quematumovil.pimienta.org/los_imsi-catchers.html&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== The electromagnetic spectrum ==&lt;br /&gt;
The electromagnetic spectrum or electric radio spectrum is not something material, but the air space that goes from the ground to the highest part of the atmosphere. In this space, frequency bands are organized, through which airplanes, wi-fi, bluetooth, walkie talkies, radios, telephones communicate, for example 2G, 3G, 4G phone networks use different bands of the electromagnetic space, through which data is transmitted. &lt;br /&gt;
&lt;br /&gt;
For more information about the electromagnetic space:&lt;br /&gt;
https://imagine.gsfc.nasa.gov/science/toolbox/emspectrum1.html&lt;br /&gt;
https://en.wikipedia.org/wiki/Electromagnetic_spectrum&lt;br /&gt;
&lt;br /&gt;
== What is a fake cell tower?==&lt;br /&gt;
Fake cell towers (also known as IMSI catchers) are devices designed to intercept the traffic of a mobile phone and track the movements of the user's phone &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IMSI-catcher &amp;lt;/ref&amp;gt; pretending to be a &amp;quot;legitimate&amp;quot; cell tower &amp;lt;ref&amp;gt;https://www.eff.org/sls/tech/cell-site-simulators &amp;lt;/ref&amp;gt;.&lt;br /&gt;
[[File:Imsi-catcher.png|thumb|none|alt=Esquema torre falsa.|Esquema de una torre falsa de celular (modificado de [http://cybernc.com/les-imsi-catchers/ Henri-Olivier]).]]&lt;br /&gt;
&lt;br /&gt;
From the way they work IMSI catchers are considered to execute &amp;quot;man in the middle&amp;quot; attacks &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Man-in-the-middle_attack&amp;lt;/ref&amp;gt;. This is defined as an attack that acquires the ability to read, insert and modify at will, messages between two parties without either of them knowing that the link between them has been compromised. The attacker should be able to observe and intercept messages between the two victims &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/IntermediateAccess &amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There is evidence that such devices have been used for surveillance purposes, for example in Ukraine the mobile phones of those attending a large demonstration were tracked and then received a mass text message stating: &amp;quot;Dear subscriber, you have been registered As a participant in a mass disturbance &amp;quot;&amp;lt;ref&amp;gt;https://antivigilancia.org/es/2015/06/la-vigilancia-y-la-protesta-social/ &amp;lt;/ref&amp;gt;. In Latin America, it is known that governments, such as Mexico and Colombia, have bought such devices.&lt;br /&gt;
&lt;br /&gt;
Unfortunately fake cell towers are becoming easier to get and their price can be as low as 500 USD. Depending on the model there is evidence that IMSI catchers can not only can intercept phone traffic, but also can also inject malware.&lt;br /&gt;
&lt;br /&gt;
'''Bold text'''==How to detect them? ==&lt;br /&gt;
&lt;br /&gt;
A first step is to have a database of the &amp;quot;legitimate&amp;quot; cell towers and the list of legitimate companies that provide these services with the necessary operating permits. Some of these databases exist, such as:  http://opencellid.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Opencell.png|thumbnail|center|Torres en en América Latina]]&lt;br /&gt;
&lt;br /&gt;
There is also information available about the frequencies on which they should operate:&lt;br /&gt;
http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
[[File:Frecuencia.png|thumbnail|center|63/5000&lt;br /&gt;
Example of frequencies on which cellular networks can operate]]&lt;br /&gt;
&lt;br /&gt;
And you can have a look at the development of the GSM network:&lt;br /&gt;
 http://www.spectrummonitoring.com/frequencies/frequencies2.html#Mexico&lt;br /&gt;
&lt;br /&gt;
There are also some applications that can be downloaded from the following free app repository:&lt;br /&gt;
F-Droid is a software repository (or &amp;quot;app store&amp;quot;) for Android applications, similar to the Google Play store. The main repository, hosted by the project, contains only apps which are free software. Applications can be browsed and installed from the F-Droid website or client app without the need to register for an account. &amp;quot;Anti-features&amp;quot; such as advertising, user tracking, or dependence on non-free software are flagged in app descriptions.[3] The website also offers the source code of applications it hosts as well as the software running the F-Droid server, allowing anyone to set up their own app repository.&lt;br /&gt;
&lt;br /&gt;
In order to detect possible false antennas, you can download from F-Droid the following applications:&lt;br /&gt;
&lt;br /&gt;
[http://cellularprivacy.github.io/Android-IMSI-Catcher-Detector/ Android IMSI Catcher Detector]&lt;br /&gt;
&lt;br /&gt;
[[File:AIMSICD-Teaser.png|400px|thumbnail|center|AIMSICD]]&lt;br /&gt;
&lt;br /&gt;
Android IMSI Catcher Detector attempts to detect IMSI-Catchers through detection methods such as: Check Tower Information Consistency,   Check LAC/Cell ID Consistency, check neighbouring cell info, prevent silent app installations, monitor Signal Strength, detect silent SMS and detect FemtoCells&lt;br /&gt;
&lt;br /&gt;
[https://opensource.srlabs.de/projects/snoopsnitch Snoopsnitch]&lt;br /&gt;
&lt;br /&gt;
[[File:Sc catcher hour.png|200px|thumbnail|center|Snoopsnitch]]&lt;br /&gt;
&lt;br /&gt;
SnoopSnitch is an Android app that collects and analyzes mobile radio data to make you aware of your mobile network security and to warn you about threats such as fake base stations (IMSI catchers), user tracking and over-the-air updates. With SnoopSnitch you can use the data collected in the GSM Security Map at gsmmap.org and contribute your own data to GSM Map.  This application currently only works on Android phones with a Qualcomm chipset and a stock Android ROM (or a suitable custom ROM with Qualcomm DIAG driver). It requires root priviliges to capture mobile network data.&lt;br /&gt;
&lt;br /&gt;
== How to protect yourself from fake cell towers?==&lt;br /&gt;
&lt;br /&gt;
If your phone allows it you can change its configuration options so that it does not connect to all available cell towers. For example on an Android phone you can go to: Configuration &amp;gt;   Wireless and networks  &amp;gt; More configuration &amp;gt; Mobile networks and there you can change &amp;gt; Network preferences  GSM/UTMS for using 3G or 4G if your smart-phone allows it and also choose for &amp;gt; Network operators &amp;gt; Choosing manually the antennas to connect. &lt;br /&gt;
&lt;br /&gt;
You can also isolate your mobile using a Faraday phone pouch, please read this other tutorial on the topic &amp;lt;ref&amp;gt;https://gendersec.tacticaltech.org/wiki/index.php/Faraday_Phone_Pouch&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery&amp;gt;&lt;br /&gt;
-Tela_y_proceso_de_bolsa_por_killyourphone-com.jpg|Phone Pouch&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Where can I see more information?==&lt;br /&gt;
&lt;br /&gt;
http://wiki.labomedia.org/index.php/GSM&lt;br /&gt;
https://quematumovil.pimienta.org/los_imsi-catchers.html&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Mobiles:_Alternatives&amp;diff=8959</id>
		<title>Mobiles: Alternatives</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Mobiles:_Alternatives&amp;diff=8959"/>
				<updated>2017-03-16T13:48:46Z</updated>
		
		<summary type="html">&lt;p&gt;Alistair: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:dany guzman.jpg|400px]]&lt;br /&gt;
&amp;lt;ref&amp;gt;Fotográfo: Daniel Guzman. Isla Negra, Chile. &amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Autonomous and Community Mobile Telephony ==&lt;br /&gt;
According to the International Telecommunication Union&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/International_Telecommunication_Union&amp;lt;/ref&amp;gt;  in the world there are between 2 to 3 billion people who lack mobile telephony services, this is due mainly because telecommunications regulatory bodies grant concessions to access the mobile radio spectrum only to large companies, restricting access to micro enterprises that wish to provide this service to rural areas for instance.&lt;br /&gt;
&lt;br /&gt;
It is common to think that the only way to communicate through mobile phones is to use the services of large transnational mobile phone companies and that profit is the only economic model for the creation and sustainability of these services. However, there are communities and villages that are located in geographically remote territories, with a low population density and / or where the economy is based on self-subsistence economies, and which remain unappealing for large companies which are in general not interested in providing services (considering for example that the initial investment Is too high). Sometimes, these communities do not want telephony services based on an unscrupulous profit model neither.&lt;br /&gt;
&lt;br /&gt;
It is within these communities that the hope is born for new creative and collaborative ways of providing telephony services. We present below some of these alternative mobile phone projects whose models are based on the exercise of the right of peoples' to communication.&lt;br /&gt;
&lt;br /&gt;
=== Rhizomatica ===&lt;br /&gt;
[[File:Untitled-2.jpg|400px]]&lt;br /&gt;
&lt;br /&gt;
The Rhizomatica organization is located in Oaxaca&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Oaxaca&amp;lt;/ref&amp;gt;, in the south-east of Mexico.&lt;br /&gt;
It works by creating bridges between communities of indigenous peoples of Mexico and people engaged in telecommunications engineering with open systems, with the objective of creating mobile telephony infrastructure to strengthen the autonomy of indigenous peoples. In order to understand the origin and success of the autonomous mobile telephony project, it is important to understand its context.&lt;br /&gt;
&lt;br /&gt;
==== Context and history ====&lt;br /&gt;
Oaxaca is a complex territory, with a great cultural diversity (17 indigenous peoples co-inhabit the territory), with a rugged geography, where the territory is communal, there are strong structures of local government recognized by the Mexican constitution and international treaties, Economy is basically based on self-subsistence.&lt;br /&gt;
&lt;br /&gt;
In the 1970s and 1980s, these peoples began their first communal enterprises for the management of common goods * forestry and aquifers that are the precedent for the current communal telecommunication enterprises described here. This complex context is the fertile ground for infrastructure projects in telecommunications that strengthen the autonomy of indigenous peoples.&lt;br /&gt;
&lt;br /&gt;
From the 2006 social movement&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Asamblea_Popular_de_los_Pueblos_de_Oaxaca&amp;lt;/ref&amp;gt; the native peoples of Oaxaca engaged in the task of creating their own means of communication, with special emphasis on the Community radios. At the moment, Oaxaca is the state with the greater concentration of these radios in all the country. Although there is no official census, social organizations estimate that there are between 60 and 100 community radios currently operating in the state of Oaxaca.&lt;br /&gt;
&lt;br /&gt;
Driven by the need for communication, the communal authorities of these towns approached innumerable times big companies to request services of mobile telephony  but the result was a refusal because they are small towns, located in remote areas and with few resources. Because of this, communal villages began a dialogue with the team of Rhizomatica to look for the ways to construct infrastructure of mobile telephony that would strengthen the autonomy of their towns. This was how the Autonomous and Community Cellular Telephone project emerged.&lt;br /&gt;
&lt;br /&gt;
==== Infrastructure ====&lt;br /&gt;
In technical terms, the autonomous mobile telephony infrastructure consists of a&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Transceiver&amp;lt;/ref&amp;gt; transceiver that emits and receives radio waves at the frequency of 850 MHz with 5 Watts of Power and an antenna located in the high part of the territory which allows to cover up to 15 km around. These are radio waves that require line of sight, meaning that mountainous geography should be considered so that the signal reaches far. Any type of phone can access these networks, a specific SIM card is not required. In the case of Oaxaca, the numbering system is constructed according to the postal code assigned to that territory. The system of administration and billing is made to be adapted to the original languages that are spoken in the locality.&lt;br /&gt;
&lt;br /&gt;
For more details about the architecture system, the hardware and software used, we recommend you to view the Rhizomatica wiki&lt;br /&gt;
http://wiki.rhizomatica.org/index.php/System_Architecture/es&lt;br /&gt;
[[File:Screenshot4.png|400px]]&lt;br /&gt;
[[File:Screenshot2.png|400px]]&lt;br /&gt;
&lt;br /&gt;
Currently (July 2016) the project encompasses 17 communities&amp;lt;ref&amp;gt;http://wiki.rhizomatica.org/index.php/Map_with_current_sites&amp;lt;/ref&amp;gt;, and some of them are interconnected. Each transceiver is owned by the communal governing body of each village. The cost per telephone registered in the network is 40 Mexican pesos per month equivalent to $ 2 USD for unlimited calls and text messages within the interconnected community or region. For out-of-town calls such as the city of Oaxaca or a city in the United States, calls come through the voice over IP (VoIP) system&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Voz_sobre_protocolo_de_internet&amp;lt;/ref&amp;gt; offering network users the lowest rates in the market. To achieve this it is important that the community that wants to have an autonomous mobile telephone system, first resolve the issue of their Internet connection. Usually this is done through local micro-enterprises that are creating networks through WiFi links to take the Internet to those places.&lt;br /&gt;
The cost of a computer, the importation of the equipment, the installation and training for its administration is approximately $ 7,000 USD. Currently Rhizomatica uses NuRAN Wireless &amp;lt;ref&amp;gt;http://nuranwireless.com/&amp;lt;/ref&amp;gt;equipment among other providers. This cost is expected to decline in the coming years with the development of new open source hardware devices.&lt;br /&gt;
&lt;br /&gt;
Among the main requirements for the installation of an autonomous mobile telephone networks we find:&lt;br /&gt;
- Count with the approval of the community assembly&lt;br /&gt;
- No signal from another mobile phone company&lt;br /&gt;
- Have an Internet connection&lt;br /&gt;
&lt;br /&gt;
Rhizomatica currently has around 3,000 users of autonomous mobile telephony services in Oaxaca. From this experience, a group of young computer students developed has replicated a similar project on the Nicaraguan Atlantic coast called SayCel&amp;lt;ref&amp;gt;http://itp.junglebrains.com/saycel-community-cellular-networks/&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==== Political achievements ====&lt;br /&gt;
The achievement of Rhizomatica and the native peoples of Oaxaca is not only technical but also political.  Last June, 2016, the civil association Telecomunicaciones Indígenas Comunitarias (TIC AC), made up of the 17 communities that have autonomous mobile telephone networks won a 15-year concession to operate telecommunications networks in 5 states of the Mexican republic: Veracruz, Guerrero, Oaxaca, Puebla and Chiapas. This achievement sets a historic precedent in telecommunications in Mexico and in the world, with which the International Telecommunication Union shows it as an example to be followed by other governments in the region.&lt;br /&gt;
&lt;br /&gt;
==== Challenges ====&lt;br /&gt;
Among the main challenges that Rhizomatica faces we find the access to data for Internet browsing and the transformation of the customer-company relationship as people are accustomed to the fact that mobile phone services are in the hands of transnational companies and not in their own hands .&lt;br /&gt;
&lt;br /&gt;
==== Videos ====&lt;br /&gt;
To know more about the project, we invite you to watch the following videos&lt;br /&gt;
Network of Santa María Yaviche: &lt;br /&gt;
{{#ev:vimeo|https://vimeo.com/97613709}}&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|https://www.youtube.com/watch?v=4cVnkOvUZtw}}&lt;br /&gt;
&lt;br /&gt;
Desinformemonos Video&lt;br /&gt;
{{#ev:youtube|https://www.youtube.com/watch?v=qQfwQ7sGvgM}}&lt;br /&gt;
&lt;br /&gt;
==== Press ====&lt;br /&gt;
WIRED article&lt;br /&gt;
English Version:&lt;br /&gt;
http://www.wired.com/2015/01/diy-cellular-phone-networks-mexico/&lt;br /&gt;
&lt;br /&gt;
Desinformemonos&lt;br /&gt;
http://desinformemonos.org.mx/la-telefonia-comunitaria-el-desafio-que-crece/&lt;br /&gt;
&lt;br /&gt;
About the 15 years concession&lt;br /&gt;
http://www.sinembargo.mx/23-07-2016/3071050&lt;br /&gt;
http://eleconomista.com.mx/industrias/2016/07/07/indigenas-oaxaca-seran-operadores-como-att-telcel-movistar&lt;br /&gt;
&lt;br /&gt;
==== Contact ====&lt;br /&gt;
[http://www.rhizomatica.org www.rhizomatica.org]&lt;br /&gt;
&lt;br /&gt;
rhizomaticomms[@]gmail.com&lt;br /&gt;
&lt;br /&gt;
[http://@rhizomatica https://twitter.com/rhizomatica]&lt;br /&gt;
&lt;br /&gt;
== Free and communitarian WIFI networks==&lt;br /&gt;
&lt;br /&gt;
=== Altermundi ===&lt;br /&gt;
[[File:altermundi.png|400px]]&lt;br /&gt;
&lt;br /&gt;
'''Altermundi “la pata tecnológica de ese otro mundo posible”'''&lt;br /&gt;
https://www.altermundi.net/&lt;br /&gt;
&lt;br /&gt;
==== History ====&lt;br /&gt;
It is a civil association that was born in the province of Córdoba&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Provincia_de_C%C3%B3rdoba_%28Argentina%29&amp;lt;/ref&amp;gt; in Argentina&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Argentina&amp;lt;/ref&amp;gt;, its mission is to create Internet infrastructure through the use of Free Software and very low cost hardware. Altermundi creates decentralized wireless networks, using WiFi routers and a&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Firmware&amp;lt;/ref&amp;gt;firmware to modify the router's operation.&lt;br /&gt;
&lt;br /&gt;
&amp;quot;A community network is a network built, managed, administrated, by the people who are going to use it. It prioritizes local traffic, maintains peering agreements&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Peering&amp;lt;/ref&amp;gt; (Internet free transit) with any network that offers reciprocity. This was the Internet when it started, that was the original spirit, which has been lost. Internet has been closed and the big networks do not give peering to the people, they broke the model of peer to pee&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Peer-to-peer&amp;lt;/ref&amp;gt;. For us, community networks have two axes: giving concrete solutions to people of flesh and blood , and at the same time &amp;quot;contaminate&amp;quot; the current the Internet with the old spirit of the Internet &amp;quot;Nicolás Echániz&amp;lt;ref&amp;gt;https://twitter.com/nicoechaniz&amp;lt;/ref&amp;gt; founding member of Altermundi.&lt;br /&gt;
&lt;br /&gt;
The main advantage of these networks is that they allow access to the Internet in villages where there is no access to the services of commercial companies but above all they are very simple to manage and administer by people in the community itself, without the need for specialized knowledge in electronics or computing and at an affordable price. In addition anyone can extend the network, respecting its design and its principles because its growth is not based in a business model.&lt;br /&gt;
&lt;br /&gt;
Through this free Internet network people have access to a local chat service, to online transmission of local community radio, to VoIP calls, to share files between peers and to games. In Argentina, these networks are located in Delta de Tigre in Buenos Aires and the Valley of Paravachasca in Cordoba.&lt;br /&gt;
&lt;br /&gt;
==== Infrastructure ====&lt;br /&gt;
The hardware&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Hardware&amp;lt;/ref&amp;gt; consists of a router and an antenna, as well as other materials to adapt the router and the cable that connects to the antenna in the open. In the router if you install a firmware (operating system) that allows autoconfiguration and other programs for personalization and monitoring of the network.&lt;br /&gt;
&lt;br /&gt;
Altermundi modifies the routers so that when connecting with a directional antenna the signal of WiFi can cover a few kilometers, in this way a network of devices with WiFi signal is built by which they can interchange data between people within a town or region and also can connect the network to what we know today by Internet, allowing to share it in the network.&lt;br /&gt;
&lt;br /&gt;
''''''What is the difference between a Free Network and a Community Network?''''''&lt;br /&gt;
Characteristics of a Free Network:&lt;br /&gt;
&lt;br /&gt;
* Free use: it can be used by its participants to offer and receive any type of service that does not affect its good functioning;&lt;br /&gt;
* Neutrality: does not inspect or modify data flows within the network beyond what is necessary for its operation;&lt;br /&gt;
* Free interconnection: allows, freedom and free services, the flow of data with other networks that respect the same conditions;&lt;br /&gt;
* Free transit: it provides other free networks access to the networks with which it maintains voluntary agreements of free interconnection.&lt;br /&gt;
&lt;br /&gt;
The goal of free networks is to return common sense to the Internet structure, allowing the free flow of information, making the most of infrastructure and lowering costs so that small businesses can be deployed easily in areas where Internet access is unfeasible. In this sense Community Networks are an expression of Free Networks because they play a fundamental role for the community through the following characteristics:&lt;br /&gt;
&lt;br /&gt;
* Collective ownership: its infrastructure is owned by the community that deploys it;&lt;br /&gt;
* Social management: the network is managed by the same community;&lt;br /&gt;
* Accessible design: information on how the network and its components work are public and accessible;&lt;br /&gt;
* Open participation: anyone can extend the network, respecting its design and its principles.&lt;br /&gt;
&lt;br /&gt;
====Political Achievements ====&lt;br /&gt;
At the same time as implementing its technology, Altermundi participated in the debate on the Digital Argentina Law approved in December 2014, achieving jointly with other sectors to include in the article 94 of the law the &amp;quot;promotion and protection of community networks&amp;quot; .&lt;br /&gt;
&lt;br /&gt;
On the other hand,  the work of Altermundi with the creation of these free and community networks, gave birth to a new ccooperation team that is developing Free-Mesh &amp;lt;ref&amp;gt;http://libre-mesh.org&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==== Desafíos ====&lt;br /&gt;
The main challenge of these free networks is to have access to a bandwidth at wholesale prices to connect to the rest of the Internet. While in Europe 1 megabytes per second cost around $ 0.78 per month, in Argentina 1 megabyte per second costs $ 40 per month, therefore more than 50 times the price in Europe.&lt;br /&gt;
&lt;br /&gt;
==Otros proyectos alternativos==&lt;br /&gt;
=== Guifi ===&lt;br /&gt;
[[File:guifi-logo.png|400px]]&lt;br /&gt;
&lt;br /&gt;
https://guifi.net/&lt;br /&gt;
&lt;br /&gt;
It is a telecommunications network as a common good. It currently has more than 30,000 active nodes within the network.&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Guifi · net is a telecommunications network in which individuals, organizations, companies and all types of entities participate by promoting and investing in a common infrastructure that provides them with access to telecommunications and the Internet of quality and at a fair price '' &amp;quot;&amp;lt;Ref&amp;gt;https://guifi.net/es/que_es &amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
An Open, Free and Neutral Network is defined as:&lt;br /&gt;
* It is open because it is universally offered to the participation of all without any kind of exclusion or discrimination and because it is informed at all times about how the network and its components work, allowing anyone to improve it.&lt;br /&gt;
* It is free because everyone can do what they want and enjoy the freedoms as foreseen in the reference of the general principles (section I), all this regardless of their level of participation in the network and without imposing terms and conditions Which contradict this agreement unilaterally.&lt;br /&gt;
* It is neutral because the network is independent of the contents, it does not condition them and, thus, they can circulate freely; Users can access and produce content regardless of financial possibilities or social conditions. When content is added to the network guifi.net is done in order to stimulate its appearance, better manage the network or simply as an exercise to incorporate content, but in no case with the aim of replacing or blocking other content.&lt;br /&gt;
&lt;br /&gt;
The Procommon of the RAAN (Open, Free and Neutral Network) is based on the following bases:&lt;br /&gt;
&lt;br /&gt;
* You are free to use the network for any purpose as long as you do not damage the operation of the network itself, the freedom of other users, and respect the conditions of the contents and services that circulate freely.&lt;br /&gt;
* You are free to know how the network, its components and its operation, you can also spread your spirit and operation freely.&lt;br /&gt;
* You are free to incorporate services and contents to the network with the conditions that you want.&lt;br /&gt;
* You are free to join the network and help to extend these freedoms and conditions.&lt;br /&gt;
&lt;br /&gt;
Map of nodes: https://guifi.net/es/node/17711/view/map&lt;br /&gt;
&lt;br /&gt;
Videos&lt;br /&gt;
http://guifitv.guifi.net/?q=node/31&lt;br /&gt;
http://media.guifi.net/&lt;br /&gt;
&lt;br /&gt;
Get involved!&lt;br /&gt;
The node is yours but the network is of all the people that connect.:&lt;br /&gt;
https://guifi.net/en/participa&lt;br /&gt;
&lt;br /&gt;
Routers and firmwares you can use to contribute to the network&lt;br /&gt;
https://guifi.net/en/firmware&lt;br /&gt;
&lt;br /&gt;
Joining guifi.net in three simple steps&amp;lt;ref&amp;gt; https://guifi.net/en/trespasos&amp;lt;/ref&amp;gt;&lt;br /&gt;
* Add a node&lt;br /&gt;
* Add a new router&lt;br /&gt;
* Add a bridge&lt;br /&gt;
&lt;br /&gt;
===Proyecto Serval ===&lt;br /&gt;
[[File:serval.png|400px]]&lt;br /&gt;
&lt;br /&gt;
http://www.servalproject.org/&lt;br /&gt;
&lt;br /&gt;
This project comes from a group of people in Australia who develop open source technology and free software to create direct connection between mobile phones, through the WiFI interfaces of the phones.&lt;br /&gt;
&lt;br /&gt;
In order to use this technology it is necessary to access as root user &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Root &amp;lt;/ref&amp;gt; to the mobile phone to be able to install a free software developed by Serval that allows the WiFi antenna In Ad-hoc type in order to create a Mesh Network &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Mesh_networking&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
You do not need an external WiFi infrastructure to the mobile phone, you simply need to activate the WiFi of the nearby mobile phones and this way you can exchange data through calls, messages, photos, etc. This data travels from one telephone to another, through the route within the connected telephone network. The services of a mobile phone company are not required. This technology allows you to make voice calls. Text messages and other data are communicated through storage and retransmission, a system known as rhizome.&lt;br /&gt;
&lt;br /&gt;
Wiki of the Serval project: http://developer.servalproject.org/dokuwiki/doku.php&lt;br /&gt;
&lt;br /&gt;
===Commotion Wireless===&lt;br /&gt;
[[File:comotion logocom.jpeg|400px]]&lt;br /&gt;
&lt;br /&gt;
https://commotionwireless.net&lt;br /&gt;
&lt;br /&gt;
A project developed by the Open Technology Institute &amp;lt;ref&amp;gt;https://www.newamerica.org/oti/ &amp;lt;/ref&amp;gt; which consists in creating mesh networks &amp;lt;ref&amp;gt;https: //wiki/Red_en_malla &amp;lt;/ref&amp;gt; &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Communication_in_the_Category &amp;lt;/ref&amp;gt;. This project has used Mobile ad-hoc network &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Mobile_ad_hoc_network &amp;lt;/ref&amp;gt;,  whcih are networks of mobile nodes connected via wireless signal.&lt;br /&gt;
&lt;br /&gt;
==Referencias== &lt;br /&gt;
 [[Category:How_To]]&lt;br /&gt;
&lt;br /&gt;
[[File:dany guzman.jpg|400px]]&lt;br /&gt;
&amp;lt;ref&amp;gt;Fotográfo: Daniel Guzman. Isla Negra, Chile. &amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Autonomous and Community Mobile Telephony ==&lt;br /&gt;
According to the International Telecommunication Union&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/International_Telecommunication_Union&amp;lt;/ref&amp;gt; there are between 2 and 3 billion people in the world who lack mobile telephony services. This is mainly because telecommunications regulatory bodies only grant concessions to access the mobile radio spectrum to large companies, and often restrict access to micro enterprises, for example service providers to rural areas.&lt;br /&gt;
&lt;br /&gt;
It is widely assumed that the only way to communicate using mobile phones is through large transnational telecoms companies, and that a for-profit business model is the only viable way of setting up and sustaining a mobile phone network. However, there are many geographically remote communities and villages with low population densities, or with self-subsistence economies, that are never likely to attract the large investment required from large companies to set up a mobile phone network. And sometimes these communities do not want services from a for-profit - and often unscrupulous - provider anyway.&lt;br /&gt;
&lt;br /&gt;
From some of these communities, new creative and collaborative ways of providing telephony services are emerging that offer hope to marginalised rural communities everywhere. Below are a few of these alternative phone projects that are based on peoples' basic right to communicate.&lt;br /&gt;
&lt;br /&gt;
=== Rhizomatica ===&lt;br /&gt;
[[File:Untitled-2.jpg|400px]]&lt;br /&gt;
&lt;br /&gt;
The Rhizomatica organization is located in Oaxaca&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Oaxaca&amp;lt;/ref&amp;gt;, in the south-east of Mexico.&lt;br /&gt;
&lt;br /&gt;
Rhizomatica works by creating bridges between indigenous communities in Mexico and people engaged in telecommunications engineering with open systems, to create mobile telephony infrastructure to strengthen the autonomy of indigenous peoples. In order to understand the origin and success of the autonomous mobile telephony project, it is important to understand its context.&lt;br /&gt;
&lt;br /&gt;
==== Context and history ====&lt;br /&gt;
Oaxaca is a complex territory, with a great cultural diversity; 17 indigenous peoples co-inhabit the territory. Oaxaca is mountainous, the territory is communal, and there are strong local government structures recognized by the Mexican constitution and international treaties. The Oaxaca economy is based on self-subsistence.&lt;br /&gt;
&lt;br /&gt;
In the 1970s and 1980s, these peoples began their first communal enterprises for the management of common goods, such as forestry and aquifers, that were the precedent for the current communal telecommunication enterprises. This complex context is the fertile ground for telecommunications infrastructure projects that strengthen the autonomy of indigenous peoples.&lt;br /&gt;
&lt;br /&gt;
From the 2006 Social Movement&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Asamblea_Popular_de_los_Pueblos_de_Oaxaca&amp;lt;/ref&amp;gt;, the native peoples of Oaxaca began work to set up their own means of communication, with special emphasis on community radio. Currently the Oaxaca state has the highest concentration of community radio in Mexico. Although there is no official census, social organizations estimate that there are between 60 and 100 community radio projects currently operating in Oaxaca.&lt;br /&gt;
&lt;br /&gt;
Driven by the need for communication, the communal authorities of towns in Oaxaca approached big companies countless times to request mobile telephony services. But their requests were always rejected because of the small population and the set up costs. Because of this, communal villages worked with Rhizomatica to look for ways to construct mobile phone infrastructure that would strengthen the autonomy of their towns. This was how the Autonomous and Community Cellular Telephone project emerged.&lt;br /&gt;
&lt;br /&gt;
==== Infrastructure ====&lt;br /&gt;
In technical terms, the autonomous mobile telephony infrastructure consists of a&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Transceiver&amp;lt;/ref&amp;gt; transceiver with 5 watts of power that emits and receives 850 Mhz radio waves and an antenna that can cover up to 15 km of the surrounding area. The tranceivers emit radio waves that require line of sight, so in mountainous terrain the location of the antenna has to be as high as possible to maxmise range. Any type of phone can access these networks; a specific SIM card is not required. In the case of Oaxaca, the numbering system is based on the postal code assigned to that territory. Administration and billing is set up so it can be easily tranlsated into the original languages of the area.&lt;br /&gt;
&lt;br /&gt;
For more details about the system architecture, the hardware and software used, read the Rhizomatica wiki&lt;br /&gt;
http://wiki.rhizomatica.org/index.php/System_Architecture/es&lt;br /&gt;
[[File:Screenshot4.png|400px]]&lt;br /&gt;
[[File:Screenshot2.png|400px]]&lt;br /&gt;
&lt;br /&gt;
Currently (July 2016) the project involves 17 communities&amp;lt;ref&amp;gt;http://wiki.rhizomatica.org/index.php/Map_with_current_sites&amp;lt;/ref&amp;gt;, and some of them are interconnected. Each transceiver is owned by the communal governing body of each village. The cost per telephone registered in the network is 40 Mexican pesos per month, equivalent to 2 USD, for unlimited calls and text messages within the interconnected community or region. For out-of-town calls, such as the city of Oaxaca or a city in the United States, calls are made through a &amp;quot;Voice over IP&amp;quot; (VoIP) system&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Voz_sobre_protocolo_de_internet&amp;lt;/ref&amp;gt; offering network users the lowest rates in the market. &lt;br /&gt;
&lt;br /&gt;
To join the project, a community first needs to have in place a good internet connection. Usually this is set up through local micro-enterprises that use WiFi links to reach rural communities.&lt;br /&gt;
The cost of a computer, the importation of the equipment, the installation and training for its administration is approximately 7,000 USD. Currently Rhizomatica uses NuRAN Wireless &amp;lt;ref&amp;gt;http://nuranwireless.com/&amp;lt;/ref&amp;gt;equipment among other providers. The hardware costs are expected to decrease in the future with the development of new open source hardware devices.&lt;br /&gt;
&lt;br /&gt;
The main requirements for the installation of an autonomous mobile telephone networks include:&lt;br /&gt;
- Vote of approval in the community assembly&lt;br /&gt;
- No existing network from another mobile phone company&lt;br /&gt;
- An Internet connection&lt;br /&gt;
&lt;br /&gt;
Rhizomatica currently has around 3,000 users of autonomous mobile telephony services in Oaxaca. Using Rhizmoatica as a model, a group of young computer students have developed a similar project on the Nicaraguan Atlantic coast called SayCel&amp;lt;ref&amp;gt;http://itp.junglebrains.com/saycel-community-cellular-networks/&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==== Political achievements ====&lt;br /&gt;
The achievement of Rhizomatica and the native peoples of Oaxaca is not only technical but also political.  Last June, 2016, the civil association Telecomunicaciones Indígenas Comunitarias (TIC AC), made up of the 17 communities that have autonomous mobile telephone networks, won a 15-year concession to operate telecommunications networks in five states of the Mexican republic: Veracruz, Guerrero, Oaxaca, Puebla and Chiapas. This achievement sets a historic precedent in telecommunications in Mexico and in the world, and the International Telecommunication Union shows Rhizomatica as an example for other governments in the region.&lt;br /&gt;
&lt;br /&gt;
==== Challenges ====&lt;br /&gt;
One of main challenges that Rhizomatica faces is enabling access to data for Internet browsing. Another challenge is the transformation from the customer-company relationship that people are used to with mobile networks, to one in which the network is in their own hands.&lt;br /&gt;
&lt;br /&gt;
==== Videos ====&lt;br /&gt;
To know more about the project, watch the following videos&lt;br /&gt;
Network of Santa María Yaviche: &lt;br /&gt;
{{#ev:vimeo|https://vimeo.com/97613709}}&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|https://www.youtube.com/watch?v=4cVnkOvUZtw}}&lt;br /&gt;
&lt;br /&gt;
Desinformemonos Video&lt;br /&gt;
{{#ev:youtube|https://www.youtube.com/watch?v=qQfwQ7sGvgM}}&lt;br /&gt;
&lt;br /&gt;
==== Press ====&lt;br /&gt;
WIRED article&lt;br /&gt;
English Version:&lt;br /&gt;
http://www.wired.com/2015/01/diy-cellular-phone-networks-mexico/&lt;br /&gt;
&lt;br /&gt;
Desinformemonos&lt;br /&gt;
http://desinformemonos.org.mx/la-telefonia-comunitaria-el-desafio-que-crece/&lt;br /&gt;
&lt;br /&gt;
About the 15 years concession&lt;br /&gt;
http://www.sinembargo.mx/23-07-2016/3071050&lt;br /&gt;
http://eleconomista.com.mx/industrias/2016/07/07/indigenas-oaxaca-seran-operadores-como-att-telcel-movistar&lt;br /&gt;
&lt;br /&gt;
==== Contact ====&lt;br /&gt;
[http://www.rhizomatica.org www.rhizomatica.org]&lt;br /&gt;
&lt;br /&gt;
rhizomaticomms[@]gmail.com&lt;br /&gt;
&lt;br /&gt;
[http://@rhizomatica https://twitter.com/rhizomatica]&lt;br /&gt;
&lt;br /&gt;
== Free and community WIFI networks==  &lt;br /&gt;
&lt;br /&gt;
=== Altermundi ===&lt;br /&gt;
[[File:altermundi.png|400px]]&lt;br /&gt;
&lt;br /&gt;
'''Altermundi “la pata tecnológica de ese otro mundo posible”'''&lt;br /&gt;
https://www.altermundi.net/&lt;br /&gt;
&lt;br /&gt;
==== History ====&lt;br /&gt;
Altermundi is a civil association that was born in the province of Córdoba&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Provincia_de_C%C3%B3rdoba_%28Argentina%29&amp;lt;/ref&amp;gt; in Argentina&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Argentina&amp;lt;/ref&amp;gt;. Altermundi's mission is to create Internet infrastructure through the use of Free Software and very low cost hardware. Altermundi sets up decentralized wireless networks, using WiFi routers and a&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Firmware&amp;lt;/ref&amp;gt;firmware to modify the router's operation.&lt;br /&gt;
&lt;br /&gt;
&amp;quot;A community network is a network built, managed, administrated, by the people who are going to use it. It prioritizes local traffic, maintains peering agreements&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Peering&amp;lt;/ref&amp;gt; (Internet free transit) with any network that offers reciprocity. This was the Internet when it started, that was the original spirit, which has been lost. Internet has been closed and the big networks do not give peering to the people, they broke the model of peer to pee&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Peer-to-peer&amp;lt;/ref&amp;gt;. For us, community networks have two axes: giving concrete solutions to people of flesh and blood , and at the same time &amp;quot;contaminate&amp;quot; the current Internet with the old spirit of the Internet &amp;quot;Nicolás Echániz&amp;lt;ref&amp;gt;https://twitter.com/nicoechaniz&amp;lt;/ref&amp;gt; founding member of Altermundi.&lt;br /&gt;
&lt;br /&gt;
The main advantage of community networks is that they allow access to the Internet in villages where there is no access to commercial services. Above all they are very simple to manage by people in the community, without the need for specialized knowledge in electronics or computing and at an affordable price. In addition, anyone can extend the network, if they respect its design and its principles, because its growth is not based on a for-profit business model.&lt;br /&gt;
&lt;br /&gt;
Through the Altermundi network people have access to a local chat service, to online transmission of local community radio, to VoIP calls, to share files between peers and to games. In Argentina, these networks are located in Delta de Tigre in Buenos Aires and the Valley of Paravachasca in Cordoba.&lt;br /&gt;
&lt;br /&gt;
==== Infrastructure ====&lt;br /&gt;
The hardware&amp;lt;ref&amp;gt;https://es.wikipedia.org/wiki/Hardware&amp;lt;/ref&amp;gt; consists of a router and an antenna, equipment to adapt the router, and a cable that connects to the antenna in position. Firmware (operating system) is instralled in  the routers that allows autoconfiguration and other programs for personalization and network monitoring.&lt;br /&gt;
&lt;br /&gt;
Altermundi modifies the routers so that when connecting with a directional antenna the WiFi signal can cover a few kilometers. In this way a network of WiFi devices is built that can exchange data between people within a town or region, and can also connect to the Internet and other community networks.&lt;br /&gt;
&lt;br /&gt;
''''''What is the difference between a Free Network and a Community Network?''''''&lt;br /&gt;
Characteristics of a Free Network:&lt;br /&gt;
&lt;br /&gt;
* Free use: the network can be used by its participants to offer and receive any type of service that does not affect its operation;&lt;br /&gt;
* Neutrality: the network does not inspect or modify data flows within the network beyond what is necessary for its operation;&lt;br /&gt;
* Free interconnection: the network allows freedom and free services; the flow of data with other networks that respect the same conditions;&lt;br /&gt;
* Free transit: it provides other free networks access to the networks, which it maintains with voluntary agreements for free interconnection.&lt;br /&gt;
&lt;br /&gt;
The goal of free networks is to return common sense to the Internet structure, allowing the free flow of information, making the most of infrastructure, and lowering costs so that small Internet businesses can be set easily in areas where Internet access is unfeasible. In this sense community networks are an expression of free networks, and they play a fundamental role in the community through the following characteristics:&lt;br /&gt;
&lt;br /&gt;
* Collective ownership: its infrastructure is owned by the community that deploys it.&lt;br /&gt;
* Social management: the network is managed by the same community.&lt;br /&gt;
* Accessible design: information on how the network and its components work are public and accessible.&lt;br /&gt;
* Open participation: anyone can extend the network, if they respect its design and its principles.&lt;br /&gt;
&lt;br /&gt;
====Political Achievements ====&lt;br /&gt;
At the same time as implementing its networks, Altermundi also participated in the debate on the Digital Argentina Law approved in December 2014, securing with other organisations the inclusion in article 94 of the law the &amp;quot;promotion and protection of community networks&amp;quot; .&lt;br /&gt;
&lt;br /&gt;
Furthermore,  the work of Altermundi on creating free and community networks, led to a new co-operation team that is developing Free-Mesh &amp;lt;ref&amp;gt;http://libre-mesh.org&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==== Desafíos ====&lt;br /&gt;
The main challenge of these free networks is to have access to bandwidth at wholesale prices to connect to the rest of the Internet. While in Europe 1 megabyte per second costs around $ 0.78 per month, in Argentina 1 megabyte per second costs $ 40 per month, more than 50 times the price in Europe.&lt;br /&gt;
&lt;br /&gt;
==Otros proyectos alternativos==&lt;br /&gt;
=== Guifi ===&lt;br /&gt;
[[File:guifi-logo.png|400px]]&lt;br /&gt;
&lt;br /&gt;
https://guifi.net/&lt;br /&gt;
&lt;br /&gt;
Guifi is a telecommunications network as a common good. It currently has more than 30,000 active nodes within the network.&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Guifi · net is a telecommunications network in which individuals, organizations, companies and all types of entities participate by promoting and investing in a common infrastructure that provides them with access to telecommunications and the Internet {with} quality and at a fair price '' &amp;quot;&amp;lt;Ref&amp;gt;https://guifi.net/es/que_es &amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
An Open, Free and Neutral Network is defined as:&lt;br /&gt;
* It is open because it is universally offered to the participation of all without any kind of exclusion or discrimination and because it is open at all times about how the network and its components work, allowing anyone to improve it.&lt;br /&gt;
* It is free because everyone can do what they want and enjoy the freedoms as foreseen in the reference of the general principles (section I), regardless of their level of participation in the network, and without imposing terms and conditions Which contradict this agreement unilaterally.&lt;br /&gt;
* It is neutral because the network is independent of the contents, it does not condition them and, thus, they can circulate freely; Users can access and produce content regardless of financial possibilities or social conditions. When content is added to the network guifi.net, it is done to stimulate its appearance, better manage the network or simply as an exercise to incorporate content, but in no case with the aim of replacing or blocking other content.&lt;br /&gt;
&lt;br /&gt;
The Procommon of the RAAN (Open, Free and Neutral Network) is based on the following principles:&lt;br /&gt;
&lt;br /&gt;
* You are free to use the network for any purpose as long as you do not damage the operation of the network itself, the freedom of other users, and respect the conditions of the contents and services that circulate freely.&lt;br /&gt;
* You are free to know how the network, its components and its operation works, and you can also spread your spirit and operation freely.&lt;br /&gt;
* You are free to incorporate services and contents to the network with the conditions that you want.&lt;br /&gt;
* You are free to join the network and help to extend these freedoms and conditions.&lt;br /&gt;
&lt;br /&gt;
Map of nodes: https://guifi.net/es/node/17711/view/map&lt;br /&gt;
&lt;br /&gt;
Videos&lt;br /&gt;
http://guifitv.guifi.net/?q=node/31&lt;br /&gt;
http://media.guifi.net/&lt;br /&gt;
&lt;br /&gt;
Get involved!&lt;br /&gt;
The node is yours but the network is of all the people that connect:&lt;br /&gt;
https://guifi.net/en/participa&lt;br /&gt;
&lt;br /&gt;
Routers and firmwares you can use to contribute to the network&lt;br /&gt;
https://guifi.net/en/firmware&lt;br /&gt;
&lt;br /&gt;
Joining guifi.net in three simple steps&amp;lt;ref&amp;gt; https://guifi.net/en/trespasos&amp;lt;/ref&amp;gt;&lt;br /&gt;
* Add a node&lt;br /&gt;
* Add a new router&lt;br /&gt;
* Add a bridge&lt;br /&gt;
&lt;br /&gt;
===Proyecto Serval ===&lt;br /&gt;
[[File:serval.png|400px]]&lt;br /&gt;
&lt;br /&gt;
http://www.servalproject.org/&lt;br /&gt;
&lt;br /&gt;
This project comes from a group of people in Australia who develop open source technology and free software to create direct connections between mobile phones, through the WiFI interfaces of phones.&lt;br /&gt;
&lt;br /&gt;
To use Serval it is necessary to access a phone as root user &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Root &amp;lt;/ref&amp;gt; to install Serval free software that allows the WiFi antenna to be used for an Ad-hoc type mesh network &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Mesh_networking&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
You do not need an external WiFi infrastructure other than the mobile phone; you simply need to cnnect via WiFi to nearby mobile phones to exchange data through calls, messages, photos, etc. This data travels diretcly from one telephone to another, so the services of a mobile phone company are not required. Serval allows you to make voice calls. Text messages and other data are communicated through storage and retransmission, a system known as rhizome.&lt;br /&gt;
&lt;br /&gt;
Wiki of the Serval project: http://developer.servalproject.org/dokuwiki/doku.php&lt;br /&gt;
&lt;br /&gt;
===Commotion Wireless===&lt;br /&gt;
[[File:comotion logocom.jpeg|400px]]&lt;br /&gt;
&lt;br /&gt;
https://commotionwireless.net&lt;br /&gt;
&lt;br /&gt;
A project developed by the Open Technology Institute &amp;lt;ref&amp;gt;https://www.newamerica.org/oti/ &amp;lt;/ref&amp;gt; which consists of creating mesh networks &amp;lt;ref&amp;gt;https: //wiki/Red_en_malla &amp;lt;/ref&amp;gt; &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Communication_in_the_Category &amp;lt;/ref&amp;gt;. This project has used Mobile ad-hoc networks &amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Mobile_ad_hoc_network &amp;lt;/ref&amp;gt;,  whcih are networks of mobile nodes connected via wireless signal.&lt;br /&gt;
&lt;br /&gt;
==Referencias== &lt;br /&gt;
 [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alistair</name></author>	</entry>

	</feed>