Ben's Guide to Protecting File Sharers From Going to Prisonv4.3

download Ben's Guide to Protecting File Sharers From Going to Prisonv4.3

of 14

Transcript of Ben's Guide to Protecting File Sharers From Going to Prisonv4.3

  • 8/14/2019 Ben's Guide to Protecting File Sharers From Going to Prisonv4.3

    1/14

    Ben's Guide to protecting Filesharers from going toprisonVersion: 4.3

    also known as the inventor of the BitTor idea, and known as "Mr. Leader" on Torrentfreak

    Thanx torrentfreak, and all filesharing networks for being strong.

    This buide is like ur FIlesharers Get Out Of Jail Free Card:

    LEGAL WARNING: THIS INFORMATION IS TO HELP PEOPLE/PROTECT PEOPLE, AND IT'S FREE AND I MAKE NO MONEY OFF OF IT. IFANYTHING GOES WRONG, OR IF CRIMINALS USE THIS GUIDE, OR IF SOMETHING HAPPENS TO YOUR COMPUTER BECAUSE YOUDIDN'T THINK TWICE AND BACKUP YOUR DATA BEFORE ERASING, OR DIDN'T THINK BEFORE YOU DO SOMETHING STUPID, YOUPROMISE YOU WON'T HOLD ME(BEN), OR DISTRIBUTERS OF THIS GUIDE ACCOUNTABLE FOR ANY CRIMES BEING COMMITED,ERRORS, THINGS GOING WRONG, AND YOU PROMISE YOU WON'T SUE ME OR ARREST ME SINCE I AM NOT RESPONSABLE FOR YOURACTIONS.ALSO YOU CANNOT ARREST BEN, OR HIS HELPERS FOR SHARING THIS GUIDE BECAUSE I HAVE THE RIGHT TO FREEDOM OF SPEECH(U.S. CONSTITUTION), AND THIS GUIDE PRACTICES FREEDOM OF SPEECH AND THE U.S. GOVT. CANNOT ARREST OR CONVICT BEN,HIS HELPERS, AND THEY CANNOT ARREST OR CONVICT DOWNLOADERS/SHARERS THAT DOWNLOAD/SHARE THIS GUIDE.

    Sorry for the caps, Just a warning to protect you and me. Also you agree to accept this legal agreement when downloading/reading this so you won'thold me in court, since I don't control peoples actions.

    Table Of Contents:

    (1)Start

    (2)Here are the main valuable tips cops and lawyers wouldn't want you to get(3)Here are some good firewall configurations(4)Tips on using a powerful Wifi Biquad Satellite Dish to devert Anti-P2P and Cops

    I decided to make this guide after this on torrentfreak: Police Extend OiNKs Bail Date and Returns Servers, Wiped!

    Written by Ernesto on December 07, 2007

    The OiNK servers that were raided in October have been returned to OiNKs ISP. Strangely enough all the data, and thus the evidence, has beenwiped. In addition, the bail date for OiNK admin Alan Ellis, who was arrested during the raid, has today been extended until the 4th of February 2008.

    OiNK's Bail ExtendedThe initial bail date was December 21, it is not clear what the reason for the extension is, but , but it is likely that the policedont have the strong evidence they would like to have.

    In fact, the police returned the servers last week, not before deleting all the evidence that it held. The police made images of the servers, butit is doubtful if destroying OiNKs property, and the original evidence is even legal.

    The British and the Dutch police both contributed to what they named Operation Ark Royal, allegedly acting upon twisted information fed to them by

    the IFPI and the BPI, two well known anti-piracy organizations.

    Among other things, the police claimed that OiNK was a money machine, and that Alan was making hundreds of thousands of pounds. However,everyone knows that OiNK was free to use and this fact was backed up by Trent Reznor, the frontman of Nine Inch Nails: If OiNK cost anything, Iwould certainly have paid, but there isnt the equivalent of that in the retail space right now.

    The IFPI and BPI did not only misinform the police, they also hijacked the OiNK.cd domain and displayed an ominous message indicating aninvestigation into the sites users had begun. These propagandistic threats were supposed to scare former OiNK members, and they succeeded inthis until OiNK reclaimed the domain.

    What once was the best BitTorrent music tracker on the Internet is now gone and wont return. Although most of its members and releasing talentfound a new homes by now, there is little doubt that the music industry will continue to alienate itself from their customers until they are dead andgone.

    For those who want to help Alan out, there is an official OiNK legal defense fundraiser where money can be donated to cover the legal costs. If forsome reason the money isnt needed it will be donated to an animal charity. At this point it is still unclear what the charges against Alan will be, ifthere will be any at all.

    Stay tuned.--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

    After this I've decided to release a torrent file with powerful erasing software, and privacy tools to keep the police out of your filesharing/downloadingbusiness and keep downloaders and sharers out of prison.

  • 8/14/2019 Ben's Guide to Protecting File Sharers From Going to Prisonv4.3

    2/14

    I have studied some law enforcement tactics and they cannot convict you if you have no evidence, such as erasing your computer then reinstallingthe operating system and use it like you did before so when cops confiscate your Computers they have no evidence to convict you of copyrightinfringement.

    They can kidnap british citizens, extradite filesharers from Canada, and probably Mexico, but if your computers erased and you used firewalls whenyou shared they might not be able to convict you.

    I also recommend you use your own open Wi-Fi so that the cops will think the filesharers used your Wi-Fi, trying to not get caught and your recordwill be swept clean.

    Here are the main valuable tips cops and lawyers wouldn't want you to get:(1)Until you get a Subpoena you Can erase/destroy the evidence, once you get a Subpoena if you attempt to destroy evidence you can getcharged with Obstruction Of Justice and Tampering with evidence.

    (2)If your not accused of terrorism you cannot let police cops into your home until they have a search warrant. Always keep your computer awayfrom your parents, family, roomates, and Wife because they can consent police to a search of your computer. If your Spouse must know what yourdoing tell him/her to understand your not doing anything wrong because file-sharing and file-downloading is Not a crime even though the MPAA andRIAA brainwashes the people into thinking downloading is stealing.

    (3)If you use encryption I recommend you use TrueCrypt because it uses AES Encryption, in fact you can use three encryption schemes such asAES, Twofish, and Serpent together. Cops can't force you to open the encryption container, unless they Use tactics such as torture, torture camps,rape threats towards your spouse/children, Tasers, or Waterboarding, if that happens use the Hidden Volume function so you can show the policeyour not a filesharing/downloading criminal so then your free to go.

    (4)Always try to encrypt your DATA, whether you use Tor, Hotspot Shield, SSH Services, SSH Shells, Anonymous Proxy Services that guarenteeyour privacy that way cops can't spy on yout traffic without using heavy encryption breakers which might desturb and mess up the internet ruining oureconomy as we know it so they have to let you use encrypted traffic.

    (5)When sharing a file to further protect yourself from prosecution share until you get at least 2 or 3 seeds then immedately stop seeding, thenyour IP Address will be taken off of other peers lists, it's not bulletproof but can further protect you from prosecution but if you use PeerGuardianalong with sharing until you get a few seeds you will most likely not be interloped by spies.

    (6)You could also use Tor or a truthworthy proxy to upload to file hosting sites like Mediafire, megaupload, rapidshare, mytempfile, or any otherfree hosting sites and share your data through there and post to warez sites, under proxy protection, that way your sharing IP will never be revealed.

    (7)You could possibly use Tor for Bittorrent because you can host hidden services so you could share anonymously through Tor using hiddenservices:

    In your Torrc file you see these configurations:

    ############### This section is just for location-hidden services ###

    ## Once you have configured a hidden service, you can look at the

    ## contents of the file ".../hidden_service/hostname" for the address## to tell people.

    #### HiddenServicePort x y:z says to redirect requests on port x to the

    ## address y:z.

    #HiddenServiceDir C:\Documents and Settings\Application Data\Tor\hidden_service/#HiddenServicePort 80 127.0.0.1:80

    #HiddenServiceDir C:\Documents and Settings\Application Data\Tor\other_hidden_service/

    #HiddenServicePort 80 127.0.0.1:80#HiddenServicePort 22 127.0.0.1:22

    ok now we are gonna do some tweaking:

    Say you use port 17492 for seeding to peers, in english that means sharing to people using bittorrent.

    #HiddenServiceDir C:\Documents and Settings\Application Data\Tor\hidden_service/HiddenServicePort 17492 127.0.0.1:17492

    So this is what you change in your torrc file.

    I'm not sure if you have to also do HiddenServiceDir, if you do ask anyone who knows about Tur for help but

    whatever you do don't tell them your gonna use Bittorrent as a hidden service, otherwise they will refuse totell you anything but Filesharing is wrong, and all that bla bla bla BS.

    (8)Always erase the free space of your hard drive every week or two times a week to prevent cops from finding deleted data. Also always eraseyour cache, cookies, MRU, and other tracks every day.

    (9)If you have a suspicion a police cop is going after you always get a small-as-it-can-be external hard drive and store all your computers data,then erase your computer, with over 10 overwrites, then restore your computer with a legally purchased operating system or restore disk, install tonsof freeware and legal software, then hide the drive in an area the cops would never search, I recommend you put it in a waterproof-fireproof lockboxand burry it where your neighbors can't see you, or hide it underground and when the cops go through your door, they will only find a working

    computer, no copyright infringement, they search through your house, no evidence, and they cannot convict you of a crime, and also remember use aWi-fi and tell the cops you can't control the airwaves and you try to warn people to use your Wi-fi legally, and then your off the hook.

    (10)Always try to share when lots of people are sharing because it is less likely a spy would pick your your shared file and collect your IP.

  • 8/14/2019 Ben's Guide to Protecting File Sharers From Going to Prisonv4.3

    3/14

    (11)When erasing your hard drive, flash drive, SD Card, Disk on key, etc etc Always use a bootup erasing software for boot devices you don'twanna use anymore, and always use a more Advanced/Secure Erasing software like Active Killdisk, Whitecanyon WipeDrive 5, Darieks Boot andNuke, or VAIOSoft DriveEraser (Recommended and Freeware :) ) to erase sensitive drives, you could also use Eraser to erase drives free spacebut I recommend you use a advanced erasing software because it erases everything, including the Master File Table (MFT) and the disk is sweptclean and ready for reuse and to be formated. I recommend you erase 8 times or more to prevent your DATA from being recovered from the FBI andMPAA professionals. It costs a bunch of money to recover erased disks but these powerful corporations probably could do this type of thing and itwould be small change to them, since they could sue you.

    (12)Anytime you wanna throw away a disk, don't do it because the FBI has been known to search through peoples trash cans, so always shredyour DVD or CD, hammer the top pieces and bottom pieces of the disk after you shred it, put black marks on the data area, then throw it in a fire, if

    theres no fire drown it in acid, if that doesn't work or if you don't have acid use large scissors on a whole disk and cut it(not recommend), or theshredded parts of the disk(recommended) and cut the shredded pieces to even smaller pieces and making recovery or police forensic scansimpossible, if it's a RW use full erase, or you could a blow torch on it.

    For more info on how to destroy a disk goto: http://www.wikihow.com/Destroy-a-CD-or-DVD in fact to keep people from tracking you from going tothat website I'll post the guide here :)

    How to Destroy a CD or DVD

    Don't just throw away old discs with personal info. Identity thieves flourish on discs like that. Annihilate them.

    Steps

    1. There are several office cd shredder machines, that operate much like common paper shredders. The least expensive are around $40.2. If you don't kill enough CDs to justify a shredder, a heavy pair of scissors can easily cut through a cd or DVD. The reflective foil will crack and

    flake at the cut line, making a clean splicing impossible. Be careful, as cutting the disc is tough.3. If you have many discs and don't want to go through the hassle/danger of cutting up or breaking them, the eco-friendly Disc Eraser is available

    for about $15 online at www.DiscEraser.com.

    4. If you are a thuggish sort and want to have a bit of fun, try smashing the offending disc! Wrap the CD or DVD in a towel and then break or crack itwith a firm kick or heavy hammer. The towel will protect you as CDs tend to shatter into sharp pieces. Place the broken CD bits into the trash whilewearing safety gloves.

    5. If you feel kind of crazy, you could place the CD or DVD into a microwave and nuke it for 5 seconds, or until you see sparks along the surface ofthe disk. When you pull it out, it'll have a spiderweb pattern of cracks. However, this can be dangerous and destroy your microwave (see thewarnings below), so it is not recommended.

    6. Put several strips of duct tape over the top of the CD. Once the tape is firmly attached, rip it off. The foil lining should come off and you will be leftwith a transparent CD. This trick does not work on all CDs.

    7. Some discs, especially burned ones, have the data layer unprotected by plastic. In this case, take a table knife to the label and start scrapingshiny flakes into a wastebasket.

    8. For the more DIY approach a belt sander on the label side. This is quite messy, little flakes all over, so do it in an area that is easy to clean.9. Take the cd outside and lay it on several layers of aluminum foil then use a blow torch to melt the cd into a puddle of goo. Actually this wastes

    your precious butane. Just light a small fire with twigs and newspaper and toss it in...10. If you have the technical background, you could do us all a favor and simply write CD burner software that a) ignores previous data on the CD,

    and b) writes an entropy file over what was there.11. or you can do a flying disk!

    Warnings

    * Some microwaves could be damaged by a cd. CDs and DVDs contain a small amount of metal. Damage may be avoided or lessened by placinga glass of water in the microwave with the CD.

    * The data on the CD or DVD can still be retrieved after microwaving it, but it would take a professional with a lot of resources.* Nuking a CD or a DVD even for 5 seconds can produce a very bad odor.* The vapors or fumes released from most DVD's and CD's while microwaving them are TOXIC. Do not do the above unless you have a spare

    microwave, as the fumes can attach to the walls of the microwave, or cling to your food.* Blow torches are dangerous and the vapors are TOXIC. Stay as far from the cd as you can while you burn it and avoid inhaling the fumes. Wear

    gloves and safety goggles and have a bucket of water handy just in case.* Due to the nature of some methods, children and irresponsible adults should not attempt to destroy a disc.* People with professional tools may still be able to read fragments of CDs, so be sure to damage the surface, not just shatter the CD.

    Things You'll Need

    * Towel* Safety Glasses* Gloves

    * Hammer - Optional* Blow torch - Optional

    (13)ALWAYS I Repeat ALWAYS Use a Firewall because it keeps the cops out of your computer, not only that they can't ban firewalls becauselegitimate/innocent users Must Have a firewall because of illgitimate hacker attacks, this is your perfect legal defense against the RIAA Hackers,MPAA Hackers, FBI Hackers, Police Hackers, Blackmailers, Revengers, and Other hackers.

  • 8/14/2019 Ben's Guide to Protecting File Sharers From Going to Prisonv4.3

    4/14

    These are the firewalls I recommend:

    Very Recommended: Sygate Firewall Pro, A Pirated Pro version would be better recommended (well Sygate went out of business becauseof Symantec, so pirating Sygate Firewall Pro won't get you arrseted)

    SSH Tunnel (Great working internal port filtering firewall, not very recommend if you fireshare with many different or get peers with manydifferent ports) (Recommend for servers, trackers, and very paranoid users) (SSH Tunnel Firewall would be recommended if you wannablack ports below 1024, but keep open ports such as 53 DNS, 80 HTTP, 443 HTTPS, 21/20 FTP, 25 SMTP, and 110 POP3)

    Zonealarm, (Recommended but very advanced. Novice filesharers, and novice downloaders may have problems with their filesharing clientsuntil they know exactly what to do)

    The reason I recommend Sygate Firewall whether Pro or Standard is because every time a application, Spyware, Virus Downloader, Browser, or anyapplication connects to the internet you can give it permission to connect once and have it popup again, or you could tell it to always allow it if youhate getting connect permission popups all the time. Very recommend for users that don't wanna validate their Windows XPs, and users that don'twanna validate their Vistas either. Also recommended for anyone that uses any software that Calls Home like a spy.

    Here are some good firewall configurations:

    Ok now here are some good configurations for some firewalls:

    SSH Tunnel

    To edit SSH Tunnels port filtering firewall edit the block_private.pol in Notepad

    The config looks like this:

    ##### private policy edit yourself### allow all local trafficPASS TCP BOTH FROM 127.0.0.1/8 TO 127.0.0.1/8 NOLOG##### ----------------------------------------------------------------------------# IP Firewall Hook Rules Examples# Rules format: Rules are applied from TOP to BOTTOM! All reserved words must be in uppercase!# WARNING : THIS IS A SAMPLE AND MUST NOT BE APPLIED TO FIREWALL BECAUSE# IT MAY NEGATIVELY AFFECT NETWORK PEFORMANCE AND SECURITY!# ----------------------------------------------------------------------------### IP rules:## PASS|DROP IP IN|OUT|BOTH FROM TO [IPPROTO ] [NOLOG]### Where is IP-address and possibly netmask (192.168.0.0/24) or "ANY"# ::== ANY# is equal to 0.0.0.0/0## And is IP-protocol number. See etc\protocol file.### Example:## PASS IP OUT FROM ANY TO 192.168.0.0/24 IPPROTO 1 NOLOG

    # DROP IP IN FROM ANY TO 127.0.0.1## ----------------------------------------------------------------------------## TCP rules:#

  • 8/14/2019 Ben's Guide to Protecting File Sharers From Going to Prisonv4.3

    5/14

    # PASS|DROP TCP IN|OUT|BOTH FROM TO [FLAGS ] [NOLOG]## Where is IP-address and possibly netmask or port range# ::== [/][:[-]]or# for example 192.168.0.1:1-1023 , 192.168.0.0/24 or## And where is sequence of one or some TCP-flags: A P S R F U E C# and '+' or '-' character after (flag is set or flag is not set)# Be carefull while using flags...If stateful inspection is activated,# you must be very careful to (albeit not suggested) use them.## Example (deny incoming connections to privileged ports from some subnet):

    ## DROP TCP IN FROM 192.168.5.0/24 TO 0.0.0.0/0:1-1024 FLAGS S+A-## ----------------------------------------------------------------------------## UDP rules:## PASS|DROP UDP IN|OUT|BOTH FROM TO [NOLOG]## Where is similiar to TCP rules case.## Example:## PASS UDP OUT FROM ANY TO 0.0.0.0/0:53# PASS UDP IN FROM 0.0.0.0/0:53 TO ANY# ----------------------------------------------------------------------------## ICMP rules:## PASS|DROP ICMP IN|OUT FROM TO [TYPE [.] [NOLOG]## Where is similiar for TCP rules case.## And and is ICMP types and codes.# For example echo request is 8.0 and echo reply is 0.0.## Example:## PASS ICMP OUT FROM ANY TO 192.168.0.1/32 TYPE 8.0## ----------------------------------------------------------------------------

    Now you can filter certain ports or IPs, that means you could block any interlopers IP Address like PeerGuardian.

    Some of these IP Addresses you can block are:

    204.92.244.0/24 UUNET-1-A Ranger subdel Syndesis, Ltd.

    65.192.0.0/24 UUNET65 MediaForce65.223.0.0/16 UUNET65 MediaForce subdel Obsidian Holdings(*)Obsidian Holdings UU-65-223 (NET-65-223-0-0-1) 65.223.0.0 - 65.223.7.255

    4.43.96.0/24 MEDIAFORCE-96-13 MediaForce correct registration!66.79.0.0/16 Mebtel Communications MediaDefender(*)

    No further subnet info64.225.202.0/25 Northwest Link MediaDefender208.225.90.0/24 UUNET1996B RIAA12.150.191.0/24 RIAA RECORDIN50-191 RIAA correct registration!208.192.0.0/16 UUNET1996B RIAA subdel Pathlink Technology(*)

    Pathlink Technology PATHLINK2 (NET-208-192-0-0-2) 208.192.0.0 - 208.192.0.25563.199.57.96/28 Pac BellPBI-NET-7 MPAA subdel Phoenix Manufacturing64.166.187.128/27 Pac Bell PBI-NET-8 MPAA subdel Valerie Bourne (what?!?!)198.70.114.0/24 MPAA NET-MPA-1 MPAA correct registration!209.67.0.0/16 Cable & Wireless MPAA subdel Exodus(*)

    source: http://www.unixhub.com/block.html

    Now some of the good configurations are:

    For blocking say port 67 UDP for example

    DROP UDP OUT FROM ANY TO 0.0.0.0/0:67DROP UDP IN FROM 0.0.0.0/0:67 TO ANY

    or say you wanna block say 67 to port 79 in UDP try these configurations:

    DROP TCP BOTH FROM ANY:67-79 TO ANYDROP UDP BOTH FROM ANY TO ANY:67-79

    Now for blocking certain type TCP ports you can try these sample configurations:

    DROP TCP BOTH FROM ANY:8081 TO ANYDROP TCP BOTH FROM ANY TO ANY:8081

    to block 8081 or

    DROP TCP BOTH FROM ANY:1023 TO ANY

    DROP TCP BOTH FROM ANY TO ANY:1023

    to block 1023

    To block certain IPs say from the RIAA you could try these configurations:

  • 8/14/2019 Ben's Guide to Protecting File Sharers From Going to Prisonv4.3

    6/14

    Lets say you wanna block 123.432.345.653 because a Interloper used

    DROP IP IN FROM ANY TO 123.432.345.653 (I am not exactly sure since I haven't tested the IP Filter, but if you sucessfully set the firewall you canblock RIAA/MPAA/Mediadefender agents from hacking or spying on your computer)

    Once you have edited your Port/IP Filter settings you need to Access Tools > Config > Firewall then you need to select 'own settings' then click onApply to apply the settings to the firewall. You may have to restart SSH Tunnel for the settings to take effect.

    PeerGuardian

    PeerGuardian is one of the best tactics to battle the RIAA/FBI/Police/DEA(Well the DEA could stop pirates under false drug charges)/MPAA/etc etc

    PeerGuarden uses lists like this to block interlopers or uninvited guests (the lists are very large, larger then the list shown below):

    City of Panama City:208.60.75.0-208.60.75.63Bay County Clerk of Courts:208.60.75.224-208.60.75.255Neustar,inc:208.60.89.128-208.60.89.159Kennedy,Covington,Lobdell and Hickman:208.60.91.0-208.60.91.31Blackmon & Blackmon:208.60.94.64-208.60.94.95Panasonic:208.60.105.64-208.60.105.79Morris,Manning & Martin:208.60.108.224-208.60.108.255Scientific Games International:208.60.110.224-208.60.110.239

  • 8/14/2019 Ben's Guide to Protecting File Sharers From Going to Prisonv4.3

    7/14

    Hampton Inn LaGrange:208.60.142.80-208.60.142.87Hampton Inn-Columbus:208.60.142.88-208.60.142.95Scherffius,Ballard,Still and Ayres:208.60.143.0-208.60.143.15City of Miami Police Department:208.60.165.200-208.60.165.207Verestar:208.60.193.0-208.60.194.255BellSouth.net - Possible Macrovision:208.61.117.0-208.61.117.255Route Object for IBMGSMIA:208.62.24.0-208.62.27.255Hamilton County Government:208.62.40.128-208.62.40.255www.hcsheriff.gov:208.62.40.221-208.62.40.221Route Object for IBMGSATL:208.62.88.0-208.62.91.255Chamber of Commerce:208.63.81.168-208.63.81.175ProLegal:208.63.82.80-208.63.82.87

    ProLegal:208.63.82.248-208.63.82.255Route Object for IBMGSMIA:208.63.148.0-208.63.155.255Route Object for IBMGSATL:208.63.156.0-208.63.159.255Dev8 Entertainment:208.64.44.0-208.64.47.255Vault Networks, Inc. - Mediadefender:208.64.67.0-208.64.67.255Nielsen Media Research Inc:208.64.96.0-208.64.99.255City of Chanute:208.64.128.0-208.64.128.15City of Chanute:208.64.129.0-208.64.129.255Telephia:208.64.168.0-208.64.175.255State-of-California:208.64.187.72-208.64.187.79G2 Satellite Solutions Corporation:208.64.188.0-208.64.191.255riaa.com.inbound30.mxlogicmx.net:208.65.144.1-208.65.144.1riaa.com.inbound40.mxlogicmx.net:208.65.144.2-208.65.144.2netenforcers.com.inbound10.mxlogic.net:208.65.144.3-208.65.144.3

    You can block people from the government and/or Anti-P2P task forces to protect yourself from possible jailtime/prisontime, lawsuits, computerconfiscations, and being banned from using a computer. Don't let the Law Enforcement keep you from having filesharing fun, stop those moneygreedy bandits by blocking their IPs.

    as you can see the lists are big, No Lie:

    this is the screenshoted size I got of todays update for peerGuardian.

    But one more thing, remember use a firewall too such as Comodo, Sygate, SSH Tunnel, or maybe ZoneAlarm because it only blocks IPs and youneed more then that to aid you in your battle against the RIAA/MPAA Lawyers.

    Tips on using a powerful Wifi Biquad Satellite Dish to devert Anti-P2P andCops:

    A court did say something like unless the police found evidence in your computer You cannot be cnvicted by your IP Address alone, even if your IP iscaught downloading/sharing, think of it anyone can use your computer as a Zombie PC, if you have Wifi, any smart hacker that could ampifly/Boosthis/her Wireless signal and could hack into your Wifi and share from your connection, but No it's not bad, this is a good thing Because The courtscan't convict you unless they get evidence on you. If you have a open WIfi you can't control what your Wifi Users do on your Wifi, so your safe aslong as the police can't find evidence on your PC, and thats where the Encryption, Erasers, and Track Cleaners come in.

    Also I decided to paste a guide on how to make a Biquad Dish thanks to http://www.engadget.com

    How-To: Build a WiFi biquad dish antenna

    Posted Nov 15th 2005 2:45PM by Eliot PhillipsFiled under: Features, Wireless

    -------------------------------------------------------------------------------

    Wireless enthusiasts have been repurposing satellite dishes for a couple years now. This summer the longest link ever was established over 125miles (see http://pasadena.net/shootout05/) using old 12 foot and 10 foot satellite dishes. A dish that big is usually overkill for most people andmodern mini-dishes work just as well. The dish helps focus the radio waves onto a directional antenna feed. We're building a biquad antenna feedbecause it offers very good performance and is pretty forgiving when it comes to assembly errors. Follow along as we assemble the feed, attach it toa DirecTV dish and test out its performance.

    Why? With just a handful of cheap parts, a salvaged DirecTV dish and a little soldering, we were able to detect access points from over 8 miles away.Using consumer WiFi gear we picked up over 18 APs in an area with only 1 house per square mile.

    Building the antenna

    Biquad antennas can be built from common materials, which is nice because you don't have to scrounge around for the perfectly-sized soup can

    (http://www.turnpoint.net/wireless/cantennahowto.html). We did have to buy some specialized parts before getting started though.

  • 8/14/2019 Ben's Guide to Protecting File Sharers From Going to Prisonv4.3

    8/14

    The most important part here is the small silver panel mount N-connector in the center of the picture; the entire antenna will be built on this. Wepurchased it from S.M. Electronics, part# 1113-000-N331-011(http://www.smelectronics.us/typenconnectorspanel.htm). The "N-connector" isstandard across the majority of commercial antennas and you can connect them to your wireless devices using "pigtails." The longer pigtail in thepicture is a RP-TNC to N-Male pigtail(http://www.wlanparts.com/product/RPTNCNM24) that we'll use to connect our antenna to a Linksys WRT54Gaccess point. The short pigtail is a RP-MMCX to N-Male pigtail (http://www.wlanparts.com/product/RP-MMCXNM12) so we can connect to our Senao

    2511CD PLUS EXT2 (http://www.wlanparts.com/product/NL2511CDPLUSEXT2) WiFi card which is pictured. We also purchased 10 feet of WBC 400coax cable (http://www.hyperlinktech.com/web/cable_feed400.php) so we wouldn't have to sit with the dish in our lap. We got our surplus DirecTVdish from Freecycle(http://freecycle.org/). We'll cover the reason for the mini butane torch later.

    Trevor Marshall built one of the first biquad WiFi antennas found on the internet(http://www.trevormarshall.com/biquad.htm). We followed the slightlymore thorough instructions found at martybugs.net(http://martybugs.net/wireless/biquad/). Here are the raw materials we started with:

    The wire is standard solid-core 3-conductor wire used for most house wiring. We didn't have any copper printed circuit board material laying aroundso we used this thin sheet of copper and supported it using the 1/4-inch thick black plastic pictured.

    The first step in building the element was stripping and cutting a 244mm length of wire.

    We marked the wire every 31mm with a permanent marker and began bending the wire into a double diamond shape. We tried to make the length ofeach leg 30.5mm.

  • 8/14/2019 Ben's Guide to Protecting File Sharers From Going to Prisonv4.3

    9/14

    The easiest way to make really sharp bends in the solid copper wire is to use two pairs of pliers. With the pliers held perpendicular to each otherbend the wire against one of the sets of jaws.

    The element with all bends completed:

    Next we cut out a 110mm square of black plastic to use as a base for the reflector. We drilled a hole in the center to clear our connector.

    We then soldered a piece of copper wire to the center pin of our N-connector.

    Next we soldered a piece of of wire to the outside of the connector. We ran into some trouble here. Our cheapy iron was not capable of getting theconnector's base hot enough to make a good solder joint. We bought a butane torch and used that to heat up the surfaces. This worked pretty well

  • 8/14/2019 Ben's Guide to Protecting File Sharers From Going to Prisonv4.3

    10/14

    except it desoldered our center pin. We recommend you solder the outside piece of wire first before doing the center one.

    After the connector had cooled it was attached to the black plastic base using epoxy. The thin copper sheet wasattached to the front with epoxy and trimmed to fit.

    We let the epoxy cure for a while before proceeding. The next step was to solder our bow tie shaped element to the vertical wires. The element wassupported by two pieces of scrap copper trimmed to 15mm to ensure proper positioning.

    Then the extra wire was trimmed off and the outside wire was soldered to the ground plane to complete the antenna.

    To make mounting to the dish easy we modified the original feedhorn. Here is what it originally looked like.

  • 8/14/2019 Ben's Guide to Protecting File Sharers From Going to Prisonv4.3

    11/14

    After removing the housing, internal components and shortening the feedhorn looked like this.

    The antenna is attached by inserting the N-connector into the tube and then connecting the coax cable.

    Here is a picture of the final antenna assembly ready to be attached to the dish.

    Since the satellite dish has an off-center feed it looks like it is pointed at the ground when it is level with the horizon. Even though there are no anglemarkings for setting the dish at 0 degrees inclination we can still ensure that the dish is pointing at the horizon by setting the dish angle to 45 degreesand mounting it on a tube with a 45 degree angle.

  • 8/14/2019 Ben's Guide to Protecting File Sharers From Going to Prisonv4.3

    12/14

    Test results

    The Engadget Corn Belt Testing Facility has broadband access provided by a local WISP. So we knew if we plugged in our antenna we were sure topick up something in the area. We pointed the dish at the closest grain elevator, where the WISP mounts their antennas. We connected the dish feedto our Senao card and started up Kismet.

    We expected to get one AP, but five is even better. Looking through the info strings we were able to determine where the APs were since the WISPhad named them according to the town they are in. The AP on channel 5 is the one we pointed at in town A, 2.4 miles away. The AP on channel 6 islocated in town B, 8.2 miles away. The two APs on channel 1 are a bridge between town A and town C which is located 2.6 miles directly behind thedish.

    Our next test was to hook our WRT54G up to the dish and point it at a hill 1 mile away. We drove to the top of the hill and used an omnidirectionalmini whip antenna(Pic below) with our Senao card to detect it.

  • 8/14/2019 Ben's Guide to Protecting File Sharers From Going to Prisonv4.3

    13/14

    Our router was picked up easily. The found 14 other WISP APs including town D, 7.8 miles away. The WISP is definitely using some high poweredequipment if we're just picking this up with an omnidirectional antenna.

    For a final test we put the dish on the roof rack and parked on top of the hill to see if we could pick up any more APs.

  • 8/14/2019 Ben's Guide to Protecting File Sharers From Going to Prisonv4.3

    14/14

    Our final count is 18 APs, 17 of those belonging to the WISP. This was a pretty fun project and shows that you can build decent wireless solutionsusing consumer gear.

    For the curious: The WISP gives its subscribers a patch antenna with a built in power-over-ethernet access point. Once the antenna is mounted tothe roof they run a single ethernet cable into the house which means they don't have to worry about signal loss from coax. These client boxes aremanufactured by Tranzeo(http://www.tranzeo.com/index.html).

    Ok now you got a lot of tips, I hope to add more tips, correct spelling errors, and improve this guide next version of this guide, thats right I will keepmaking changes and updates since the laws can change, technology can change, products and services can change, filesharing protocols can

    change, well Thanks for reading this and I hope I gave you enough information on how to stay out of trouble while filesharing/downloading :) 0:)

    thanks and have a great day!