The nAbAt a ICC soApboX
Saturday,Jan 25,2020 
27 Users Online
Anti Censorship Carepackage | By RedAcor | January 1, 2020 - 02:55 | Posted in CyberGuerrilla | 9 Comments

When authorities block Twitter, Facebook or other, here how u can go around blockade.

Most of the time, your ISP automatically assigns a primary and secondary DNS server when your router or computer requests network information via DHCP. But what if those ISP-provided DNS servers aren’t working properly or “they” block certain sites?


What if tor is blocked (click on image!!!)

Ways to connect when authorities block services:

DNS: Internet’s Directory Privacy First: Guaranteed.
DNS IPv4 = /
DNS IPv6 = 2606:4700:4700::1111 / 2606:4700:4700::1001

In case it is needed: Dial up internet access VPN Jabber … These dial-up numbers are meant to help you connect to the Internet in case of blackout. Please be aware that they don’t prevent wiretapping (usual care applies, like using HTTPS) and they do cost the price of an international call.
France (provided by FDN)
Phone Number: +33172890150
Username: toto
Password: toto
Sweden (provided by Gotanet)
Phone Number: +46708671911
Username: toto
Password: toto
The Netherlands (provided by XS4ALL)
Phone Number: +31205350535
Username: xs4all
Password: xs4all
Report a broken line
If you’re experiencing issues with one of the lines listed above please let us know. If you have a dial-up line and want to help people to connect, feel free to contact us ‏@TelecomixSyria and we’ll list it

The Government in Turkey has taken down Facebook and Twitter amid their countries unrest over a development demolition. For people in Turkey free VPN.
Username: vpnbook
Password: rac3vat9

  • euro1.vpnbook.c­om (Anonymous VPN)
  • euro2.vpnbook.c­om (Anonymous VPN)
  • uk1.vpnbook.com­ (UK VPN – optimized for fast web surfing; no p2p downloading)
  • us1.vpnbook.com­ (US VPN – optimized for fast web surfing; no p2p downloading)

The CyberGuerrilla Anonymous Nexus also provide OpenVPN accounts, Jabber OTR and secure mail all on servers of our own without logging ip’s. See https://cyberguerrilla.info for what we can offer for ur safety contact https://cyberguerrilla.info/contact/ or hit me on IRC Connect to our IRC.

This Post is Tagged with:

9 Responses to Anti Censorship Carepackage

  1. Pingback: How and Why To Re-Rout DNS Through Your Computer or Phone

    […] See Also – CyberGuerrilla Internet Censorship Care Package: https://www.cyberguerrilla.org/blog/anti-censorship-carepackage/ […]

  2. Algorithm
    -Take a text
    -Put a Bode diagram on it
    -Retrieve data in and outside the diagram.

    -Split a text in several parts
    -Put these parts on the faces of a polytope
    -Vertices of polytope are encryption key

    -get the occurrency of a text
    -These frequencies are considered as a antenna frequency with a Bode diagram.

    4)-split a text with the several faces on a polytope
    -Make a computing generated hologram of that polytope

    5)-Get a map of internet trafic
    -Make a computing generated hologram with it

    6)get a map from internet trafic
    -Make all possible polytope with it
    -Put text inside polytopes

    7)Choose a partial differential équation
    -Make the Lie group of symmetry
    -Link numerical variables to words or bits which are translated, rotated
    8)get any polytope
    -put texts on faces
    -Make a Dudeney dissection of polytope

    -Get a polytope
    -Put it on coordinates spot
    -Get the coordinates of the vertices
    -Link these coordinates with bits or words
    -Get a polytope
    -Put any human faces on the polytope faces
    -Vertices are new faces

    11) get a polytope
    -Use it as a biometric recognition cell
    -Take the points at the edges of
    of a human face on this biometric polytope
    -Colors (rgb)of that points is encryption key

    12) -get a polytope
    -Put text on faces
    -Use povray raytracer to make a computing picture of it with the coordinates of faces or vertices as parameters for light, texture, motion
    13) -get a polytope
    -Put any chess play on the faces (static or dynamic playing)
    -Edges are another chess play

    14) get any chess game
    -Link the entire play (e4 e5, etc)
    with words
    -Get the occurrency of the words respect to the chess game
    -Get the frequency
    -Consider a polytope
    -Put the peak of that frequency in the edges
    -Get a polytope
    -Put IP on the vertices
    – Construct others IP with the faces

    16) get the chess algorithm
    -Run these algorithm on the faces or edges of a polytope
    -words or bits are chess pieces (king, queen pawn)

    17)choose any chess game
    -Make a Dudeney transformation of the chess board
    -Get the new game

    -Get the financial market curves
    -Put all that curves on the edges of a polytope so that they remain in the polytope
    -Faces are encription key (same with faces instead of edges at the beginning

    -Get a polytope as a biometric recognition of the financial market curves
    -The edges of polytope are made fuzzy with the curves of financial curves
    -A fuzzy polytope is created

    -Consider each faces of a polytope as neural network cells with edges as connection

  3. Algorithm :
    -Choose a sequence of words (bits) in a text
    – Consider the lenght of that sequence as the lenght of a line
    -Make the following dissection of a rectangle with the lines of sequence words as lines dissecting the rectangle
    -Put a text (bit) in that dissected rectangle
    -Separate the different part of the rectangle.

    source:”a note on recursive dissection of n distinct polygon “”akayima”

    “4 dissection of star shape polygon with n vertices ”
    Target required :tax office ,any government
    Guilty of :origin of capitalism

  4. Tnx for you good article for android.you fix
    my problem.

  5. dnscrypt-proxy

  6. i respect shit like this.

  7. Pingback: CyberGuerrilla soApboX » Dhaka – Bangladesh

    […] Anti Censorship Carepackage […]

  8. February 7, 2018 at 21:33
    Hannebal AGS5 says:

    Add me to cyber guerrilla

  9. February 7, 2018 at 21:31
    Hannebal AGS5 says:

    Thank you for this post

Leave a Comment (Anonymous).

Comment author must fill out name and e-mail. (Email will not be published).

NOTE - You can use these (HTML tags and attributes):

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Whoever you are, we are ungovernable! Whoever lays his hand on us to govern us, is a usurper and tyrant, and we declare you our enemy.