• Here is a link to the full explanation: https://rollitup.org/t/welcome-back-did-you-try-turning-it-off-and-on-again.1104810/

Government taking down the internet!

deprave

New Member
it won't work....it would be hillarious if they scam corporations into think this would work like its illustrated in the video. Based on the video here is the easy way to get around it, real quick:

for windows (sorry I am not on windows so not a perfect explanation :

Go to properties of your network adapter, click tcip/4, go to settings, look for nameserver settings, now here you will just enter what nameservers you'd like to use, example for google you put 8.8.8.8 and 8.8.4.4. You can just use one outside the US and the internet will then work like normal. To make it active without restarting your connection hit start->run->type cmd and hit enter-> type ipconfig /flushdns and press enter.


for linux or mac: open command prompt and paste this script I just wrote: sudo for i in `cat /etc/resolv.conf|grep -v nameserver`; do awk -F '$i ' >> /etc/resolv.conf`;done; && sudo echo "name server 8.8.8.8" >> /etc/resolv.conf && sudo echo "nameserver 8.8.4.4" >> /etc/resolv.conf

(or just open /etc/resolv.conf in an editor and change the name server entries.
 

Harrekin

Well-Known Member
it won't work....it would be hillarious if they scam corporations into think this would work like its illustrated in the video. Based on the video here is the easy way to get around it, real quick:

for windows (sorry I am not on windows so not a perfect explanation :

Go to properties of your network adapter, click tcip/4, go to settings, look for nameserver settings, now here you will just enter what nameservers you'd like to use, example for google you put 8.8.8.8 and 8.8.4.4. You can just use one outside the US and the internet will then work like normal. To make it active without restarting your connection hit start->run->type cmd and hit enter-> type ipconfig /flushdns and press enter.


for linux or mac: open command prompt and type: sudo echo "name server 8.8.8.8" >> /etc/resolv.conf && sudo echo "nameserver 8.8.4.4" >> /etc/resolv.conf
I'd be expecting a Tomahawk Missile in your window pretty soon, you're spoiling their "genius" plan.
 

deprave

New Member
Really don't think this is their grandmaster plan....the video must have it wrong... this is really basic stuff...
 

deprave

New Member
Wow so I read up on it and it is THEIR PLAN LMAO.....and let me tell you as someone who maintains a lot of DNS servers...This will threaten your security if you don't change from your ISP's normal Filtered DNS settings you are going to be hacked, guaranteed, not only this but you would lag so bad it won't even work right half the time.

If by some miracle this passes, it would break the internet in the US essentially...but all you would have to do is enter the code I posted above and you would be back to normal...this is hilarious really...dumb fucking bureaucrats..
 

sso

Well-Known Member
the government becomes more and more just an annoyance.

to be ignored as a sad joke. :) thank god they are so stupid, most people easily avoid their bullshit.
 

deprave

New Member
Yea I mean..what do you think your ISP's are going to tell you when they are getting bombared with calls and people yelling...They are going to tell you exactly what I just did to get around it. They aren't going to want to deal with that. This is sooooo fucking stupid.


I'm actually all for it...sounds like ez money for me lol
 

deprave

New Member
Just saw this:

Internet Engineers' Letter Urging Amendment of the PROTECT-IP Act


To Members of the United States Senate:
We urge the modification of S. 968, the PROTECT-IP Act of 2011, to remove the provision requiring
that domestic Internet service providers filter their Domain Name Service (“DNS”) results to protect
brand and copyright owners against online infringement.

We are engineers who have spent our careers working in and with the Internet's domain name system at
a nuts-and-bolts level. We have developed or collaborated on key technical standards that are
fundamental to the functioning of the Internet. We are recognized as leading experts in this particular
field of technology. Ordinarily we do not get involved in legislative debates, but we believe that our
background leaves us ideally situated to offer a full and realistic evaluation of the likely consequences
of certain provisions of S. 968.


We recognize and strongly support the rights of brand and copyright owners and we believe that S.
968's provisions curtailing the use of domestic advertising and payment networks by infringing web
sites are well considered and will prove effective. However, the filtration of DNS results required by S.
968 would prove both costly and ineffective, and would have serious negative side effects.

PROTECT-IP's Proposed DNS Filtering Is Not Technically Feasible


As drafted, S. 968 calls for DNS editing that is not technically feasible, and incompatible with Internet
DNS security extensions (also known as DNSSEC or Secure DNS). These security features have been
under development for more than fifteen years with heavy investment by both US industry and US
Government, and are now being deployed globally. ICANN has signed the DNS root zone, the U.S.
Government has signed .EDU, .GOV and .MIL, large generic top level domains including dot-COM,
dot-NET, and dot-ORG are signed, and almost 80 of countries have signed their top-level domains1.
We stand now on the threshold of the next era in Internet security infrastructure, in which new and
more secure applications from e-shopping to e-banking can can rely on Secure DNS as their foundation
for online identity. If not amended to remove the DNS filtering provision, S. 968 would demand that
ISPs choose between deploying Secure DNS and ignoring court-ordered DNS filtering, or forgoing
Secure DNS in order to comply with the law.
Recent letters2 and online posts3,4 by proponents of S. 968 have misstated key facts about DNS and
Secure DNS. A white paper5 by the authors of this letter provides a comprehensive technical critique of
the DNS provisions of S. 968, endorsed by the editorial boards of prominent national newspapers6,7.

PROTECT-IP's Proposed DNS Filtering Would Be Ineffective
Even assuming that domestic ISPs make the high initial and ongoing investment in name server
filtering required by S. 968, ISPs cannot force their customers to use their name servers. Any user can
avoid such filtering by using another name server, possibly located off-shore and not subject to US law.
These off-shore name servers will be capable of redirecting web traffic to malicious sites including fake
banks and search engines.
By moving information-rich DNS lookup data offshore, users would create risk for the whole US
information economy, not just for themselves. And the effort and expertise required to change a user's
DNS settings is trivial, often reduced to “one click” or even completely automated.
PROTECT-IP's DNS Filtering Would Bring Negative Side Effects
Proponents of the DNS provisions of S. 968 assert that this proposed legislation would have no impact
on Internet infrastructure. The facts about Secure DNS say otherwise. Secure DNS means being able to
verify the integrity and source of DNS data, e.g., allowing a user to know whether it has reached their
bank or an impostor site. DNS filtering asks DNS servers to “lie” by providing incorrect responses. If
Secure DNS is deployed, a user's DNS client will know when it is being lied to. But it won't know
whether the lie is the result of court-ordered DNS filtering or criminal interference with the user's DNS
lookup. The inability to distinguish legitimate DNS diversions from malicious ones will make it
impossible to use DNSSEC as a platform to build robust security protections.
Any comparison of S. 968's DNS provisions to current filtering technologies such as parental controls
or spam or malware blocking is inapt. These technologies are wanted by, and indeed installed and
operated by, the end users themselves. When provided by ISPs, users do not complain or change their
name servers because they are happy with the filtering. It should also be noted that when ISPs deploy
Secure DNS, they will no longer be able to use the current filtering technologies. As described above,
DNS filtering and Secure DNS are mutually incompatible.

Requiring ISPs to deploy DNS filtering is futile and dangerous. The mere threat of S.968's filtering
provision has resulted in the marketing in this country of fast, easy and zero-cost tools to change users'
name servers. Just as we predicted in our white paper, there are now numerous evasive DNS services
which promise to evade any mandated DNS blocking8,9,10. Annually, there are 58 billion page visits to
sites dedicated to infringing activities which represents an enormous level of demand. To satisfy that
demand, users will change their name servers.

PROTECT-IP's DNS Provisions Should Be Dropped
As stated, S. 968's goals are laudable, and its provisions regarding domestic advertising and payment
networks are reasonable. However, no good and much harm can come from the DNS provision of S.
968 as currently written, and we urge that this provision be dropped when the bill is considered by the
full Senate.
Signed,
Steve Crocker, Ph.D. – co-creator of the original ARPANET protocols; former Internet Engineering
Task Force (IETF) security area director, former Internet Architecture Board member, former Internet
Society board member; member of ICANN security and stability advisory committee.
David Dagon, Ph.D. – author of numerous peer-reviewed studies of Secure DNS; co-founder of
Internet security company providing DNS-based defense technologies; inventor of proposed anti-
poisoning technology for DNS.
Dan Kaminsky – noted security researcher best known for his work finding a critical flaw in the
Internet’s Domain Name System (DNS); of the seven Recovery Key Shareholders who possess the
ability to restore the DNS root keys, Dan is the American representative.
Danny McPherson – Chief Security Officer, Verisign, Inc.; member FCC CSRIC; appointed member
Internet Architecture Board; author of numerous security and engineering studies, Internet RFCs, and
several books; member of ICANN security and stability advisory committee.
Paul Vixie, Ph.D. – founder of Internet Systems Consortium (ISC), operator of “F” root DNS name
server, publisher of BIND DNS software system; IETF DNS protocol contributor; member of ARIN
Board of Trustees; member of ICANN security and stability advisory committee.
1 DNSSEC Deployment Project, http://www.dnssec-deployment.org/
2 IFTA, et al, “To the Members of the United States Senate”, http://www.mpaa.org/resources/f63d5736-4e36-49fb-a452-
586b23d24b04.pdf
3 George Ou, “DNS Filtering is Essential to the Internet”, http://www.hightechforum.org/dns-filtering-is-essential-to-the-
internet/
4 Michael O'Leary, “PROTECT-IP Letter from Law Professors Didn't Do its Homework”,
http://blog.mpaa.org/BlogOS/post/2011/07/07/PROTECT-IP-Letter-from-Law-Professors-Did-Not-Do-its-
Homework.aspx
5 Steve Crocker, David Dagon, Dan Kaminsky, Danny McPherson, and Paul Vixie, “Security and Other Technical
Concerns Raised by the DNS Filtering Requirements in the PROTECT-IP Act”, http://www.shinkuro.com/PROTECT
%20IP%20Technical%20Whitepaper%20Final.pdf
6 The Los Angeles Times, “Policing the Internet”, http://www.latimes.com/news/opinion/opinionla/la-ed-protectip-
20110607,0,2415749.story
7 The New York Times, “Internet Piracy and How to Stop It”, http://www.nytimes.com/2011/06/09/opinion/09thu1.html
8 Domain Incite, “Pirates set up domain seizure workaround”, http://domainincite.com/pirates-set-up-domain-seizure-
workaround/
9 Telecomix DNS, http://dns.telecomix.org/
10 Dot-P2P, http://dot-p2p.org/
 

deprave

New Member
from opendns, these filter malware/virus sites for added security.

208.67.222.222
208.67.220.220

you can use any dns server really, if you have linux just start typing dig WHATEVER.COM and pick one

this is a fast one that doesn't filter malware in virgina:


  • 208.94.147.150
  • 208.94.147.151
Those will be faster then your ISP but those are both USA ones
 

unohu69

Well-Known Member
one that would work of course lol. I havent checked to see what im running now. You explained everything very well. Thanx.



sweet, again thanx. I was wondering about the security of using a foreign dns after reading your last post.


I just happen to be watching "j edgar" fuckin scary what that mofo got away with, and the dark path our gov has been on ever since.
 

deprave

New Member
Well if a dns server is hacked they can change the records so like CHASEBANK.COM points to a fake chase bank site or something, this is assuming that the dns server has authority over that domain. That would mean the owner of chasebank.com gave them that authority, they do have to give someone the authority. A properly setup bind dns server like any professional company uses is not going to be hackable except from like a rogue employee or something.

You really don't wan't to go around just using any name server, but any reputable web hosting company will be fine.

What this act is proposing is some untested software that is crap and will be hacked.
 

deprave

New Member
Also don't be afraid to use google, nameservers don't log queries or their hard disk would fill up rapidly and they would break down and lag and be way too expensive. It is also cached so its not a noticeable speed improvement or anything. There is really NOT a good reason to change yours unless this bill seriously passed and was implemented which I HIGHLY DOUBT will happen.

All a nameserver does is translate addresses its very simple and it doesn't give out any of your info or something and is not logged so don't worry about it your just wasting your time to change it really.
 
Top