Thread Status:
Not open for further replies.
  1. Daniel

    Daniel New Member Member

    Nov 5, 2009
    From Anonymous

    _        __        ___                 __               _                
    | |     / /__     /   |  ________     / /   ___  ____  (_)___  ____      
    | | /| / / _ \   / /| | / ___/ _ \   / /   / _ \/ __ `/ / __ \/ __ \    
    | |/ |/ /  __/  / ___ |/ /  /  __/  / /___/  __/ /_/ / / /_/ / / / / _ _ _
    |__/|__/\___/  /_/  |_/_/   \___/  /_____/\___/\__, /_/\____/_/ /_(_|_|_)_)
                                                  /\_/ /
                                                  \ _ /                                      
    #OpDarknet Press Release - 10/15/2011
       Timeline of Events
    At apprx 8:30 CST while browsing the Hidden Wiki we noticed a section called Hard Candy which was dedicated to links to child pornography. We then removed all links on the website, within 5 minutes the links were edited back in by an admin. For this reason, we will continue to make the Hidden Wiki unavailable.
    At apprx 8:45 CST we noticed 95% of the child pornography listed on the Hidden Wiki shared a digital fingerprint with the shared hosting server at Freedom Hosting.
    At apprx 9:00pm CST on October 14, 2011 We identified Freedom Hosting as the host of the largest collection of child pornography on the internet. We then issued a warning to remove the illegal content from their server, which they refused to do.
    At apprx 11:30pm CST on October 14, 2011 We infiltrated the shared hosting server of Freedom Hosting and shutdown services to all clients due to their lack of action to remove child pornography from their server.
    At apprx 5:00pm CST on October 15, 2011 Freedom Hosting installed their backups and restored services to their child pornography clients. We then issued multiple warnings to remove all child pornography from their servers, which Freedom Hosting refused to do.
    At apprx 8:00pm CST on October 15, 2011 despite new security features, we once again infiltrated the shared hosting server at Freedom Hosting and stopped service to all clients.
         Our Statement
    The owners and operators at Freedom Hosting are openly supporting child pornography and enabling pedophiles to view innocent children, fueling their issues and putting children at risk of abduction, molestation, rape, and death.
    For this, Freedom Hosting has been declared #OpDarknet Enemy Number One.
    By taking down Freedom Hosting, we are eliminating 40+ child pornography websites, among these is Lolita City, one of the largest child pornography websites to date containing more than 100GB of child pornography.
    We will continue to not only crash Freedom Hosting's server, but any other server we find to contain, promote, or support child pornography.
          Our Demands
    Our demands are simple. Remove all child pornography content from your servers. Refuse to provide hosting services to any website dealing with child pornography. This statement is not just aimed at Freedom Hosting, but everyone on the internet. It does not matter who you are, if we find you to be hosting, promoting, or supporting child pornography, you will become a target.
         Images & Misc
    Dead Server Screenshot:
    Freedom Host PR Screenshot:
    Our Manifesto: 
      #Antisec | #Anonymous | #FreeTopiary | #AnonOps | #FreeAnons | #OccupyWallSteet | #OWS
    We are Anonymous.
    We are Legion.
    We do not forgive.
    We do not forget.
    Expect us.
       Server Information
    phpinfo() of FreedomHosting:
    System  FreeBSD server 8.2-RELEASE-p3 FreeBSD 8.2-RELEASE-p3 #0: Tue Sep 27 18:45:57 UTC 2011 amd64
    Build Date      Aug 26 2011 03:00:30
    Configure Command       './configure' '--with-layout=GNU' '--localstatedir=/var' '--with-config-file-scan-dir=/usr/local/etc/php' '--disable-all' '--enable-libxml' '--with-libxml-dir=/usr/local' '--with-pcre-regex=/usr/local' '--with-zlib-dir=/usr' '--program-prefix=' '--disable-cgi' '--with-apxs2=/usr/local/sbin/apxs' '--with-regex=php' '--with-zend-vm=CALL' '--disable-ipv6' '--prefix=/usr/local' '--mandir=/usr/local/man' '--infodir=/usr/local/info/' '--build=amd64-portbld-freebsd8.2'
    Server API      Apache 2.0 Handler
    Virtual Directory Support       disabled
    Configuration File (php.ini) Path       /usr/local/etc
    Loaded Configuration File       /usr/local/etc/php.ini
    Scan this dir for additional .ini files         /usr/local/etc/php
    Additional .ini files parsed    /usr/local/etc/php/extensions.ini
    PHP API         20090626
    PHP Extension   20090626
    Zend Extension  220090626
    Zend Extension Build    API220090626,NTS
    PHP Extension Build     API20090626,NTS
    Debug Build     no
    Thread Safety   disabled
    Zend Memory Manager     enabled
    Zend Multibyte Support  disabled
    IPv6 Support    disabled
    Registered PHP Streams  php, file, glob, data, http, ftp, zip, compress.zlib
    Registered Stream Socket Transports     tcp, udp, unix, udg
    Registered Stream Filters       convert.iconv.*, string.rot13, string.toupper, string.tolower, string.strip_tags, convert.*, consumed, dechunk, zlib.*
    Apache Version  Apache
    Apache API Version      20051115
    Server Administrator
    Hostname:Port   xqz3u5drneuzhaeo.onion:0
    User/Group      www(80)/80
    Max Requests    Per Child: 10000 - Keep Alive: off - Max Per Connection: 100
    Timeouts        Connection: 900 - Keep-Alive: 60
    Virtual Server  Yes
    Server Root     /usr/local
    Loaded Modules  core prefork http_core mod_so mod_authz_host mod_file_cache mod_cache mod_disk_cache mod_filter mod_deflate mod_env mod_expires mod_headers mod_setenvif mod_mime mod_status mod_autoindex mod_dir mod_alias mod_rewrite mod_bw mod_php5 mod_alias_basedir mod_vhost_alias_frdmhst
    Apache Environment
    Variable        Value
    HTTP_HOST       xqz3u5drneuzhaeo.onion
    HTTP_CONNECTION         close
    HTTP_USER_AGENT         Mozilla/5.0 (Windows NT 6.1; rv:5.0)
    HTTP_ACCEPT     text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    HTTP_ACCEPT_LANGUAGE    en-us,en;q=0.5
    HTTP_ACCEPT_CHARSET     ISO-8859-1,utf-8;q=0.7,*;q=0.7
    HTTP_DNT        1
    HTTP_COOKIE     visitz=0; sort=0a
    PATH    /bin:/usr/bin:/usr/ucb:/usr/bsd:/usr/local/bin
    SERVER_SIGNATURE        no value
    SERVER_SOFTWARE         Apache
    SERVER_NAME     xqz3u5drneuzhaeo.onion
    SERVER_PORT     80
    DOCUMENT_ROOT   /home/fh/www
    SCRIPT_FILENAME         /home/fh/users/l/i/lolitacity/www/index.php
    REMOTE_PORT     56818
    SERVER_PROTOCOL         HTTP/1.0
    QUERY_STRING    no value
    REQUEST_URI     /users/lolitacity/index.php
    SCRIPT_NAME     /users/lolitacity/index.php
  2. Maniac_

    Maniac_ Well-Known Member Respected

    Nov 17, 2009
  3. Daniel

    Daniel New Member Member

    Nov 5, 2009
    It's from yesterday - not that old :))
  4. Shadow008

    Shadow008 Banned Banned

    Jul 29, 2010
    :facepalm: i have got this pm few days back,made me l0l

  5. Maniac_

    Maniac_ Well-Known Member Respected

    Nov 17, 2009
    Actually 3 days ago, but this now made me realize the amount of hours i spent online the past week.. holy shit! :D
  6. soft2050

    soft2050 New Member Member

    Sep 3, 2010
    Best move they haz taken by hacking websites
  7. nba517

    nba517 Banned Banned

    Aug 3, 2011
    it is old news but it is new for me
  8. Majky71

    Majky71 New Member Member

    Feb 20, 2011
    nice hope whey kill more ilegal site
  9. Loget

    Loget Well-Known Member Member

    Jan 24, 2009
    Anonymous, the interwebz's very own justice league.
  10. Gavo

    Gavo Super Moderator Staff Member

    Jul 9, 2009
    I found a site where the admin posts underage stuff all the time, I got the site taken down but its back and still he posts underage stuff.

    I reported him to filehosts and they only remove 1 file at a time, the DC ignored me until i posted on a very public site, in all i spent about 18h getting his content removed before i realised i was wasting my time and just reported the site to the FBI.

    The worst thing is this guy is in top 100 earners at a certain filehost, it makes you sick this content is so popular and little is done about it.

    Nice one Anonymous for taking this down. :sun:
  11. rkze1

    rkze1 New Member Member

    Nov 5, 2010
    lol that "admin" is hilarious, for a filthy piece of shit.
  12. .:NightDemon:.

    .:NightDemon:. New Member Member

    Oct 2, 2011
    I believe this is the first good thing that Anonymous has done... well I'm happy to see they do good things.. keep up the good work ;)
  13. inathan

    inathan Banned Banned

    Oct 11, 2011
    We are Anonymous.
    We are Legion.
    We do not forgive.
    We do not forget.
    Expect us.

    legionare = 4chan.

    i'm sure.
  14. Gh0st

    Gh0st New Member

    Feb 18, 2010
    That pastebin was really funny. xD
  15. Kedzi

    Kedzi New Member Member

    Nov 22, 2009
    That's justice tight there
  16. Phozon

    Phozon Banned Banned

    Dec 9, 2008
    i've found a few sites like this mostly hidden under TGP's. (Got around 17 of them shutdown btw ^^) Anyway, as you say little to nothing is done about this. first time i found a kiddie porn site i phoned the police to report it the assholes hungup on me. So i took it into my own hands to catch out the sick fuckers, i setup a chan site dedicated to "legal porn" however like most of these sites they get flooded by pedo's. in the end i had a list of over 2000 pedo ip addresses and links to what they posted.
    i downloaded a backup of the chan edited out my info sent the DB to a guy who lived near an FBI office and he sent them the whole database on cd-r. Never got a thanks but hey 2000+ pedo's got caught ^_^

    So back on topic i fully support anon for this work.
  17. QuickSand

    QuickSand Well-Known Member Member

    Jun 28, 2010
    this was posted here before,the logs are pretty funny though
  18. Daniel

    Daniel New Member Member

    Nov 5, 2009

    Can you give the exact link before you come with claims that can not back up your claim. I have actually not seen it here before. Thank you
  19. Phamous

    Phamous New Member Member

    Jan 24, 2009
  20. Daniel

    Daniel New Member Member

    Nov 5, 2009
    I apologize.

Thread Status:
Not open for further replies.

Share This Page