[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

Real Monetary Reform

More Young Men Are Now Religious Than Women In The US

0,000+ online influencers, journalists, drive-by media, TV stars and writers work for State Department

"Why Are We Hiding It From The Public?" - Five Takeaways From Congressional UFO Hearing

Food Additives Exposed: What Lies Beneath America's Food Supply

Scott Ritter: Hezbollah OBLITERATES IDF, Netanyahu in deep legal trouble

Vivek Ramaswamy says he and Elon Musk are set up for 'mass deportations' of millions of 'unelected bureaucrats'

Evidence Points to Voter Fraud in 2024 Wisconsin Senate Race

Rickards: Your Trump Investment Guide

Pentagon 'Shocked' By Houthi Arsenal, Sophistication Is 'Getting Scary'

Cancer Starves When You Eat These Surprising Foods | Dr. William Li

Megyn Kelly Gets Fiery About Trump's Choice of Matt Gaetz for Attorney General

Over 100 leftist groups organize coalition to rebuild morale and resist MAGA after Trump win

Mainstream Media Cries Foul Over Musk Meeting With Iran Ambassador...On Peace

Vaccine Stocks Slide Further After Trump Taps RFK Jr. To Lead HHS; CNN Outraged

Do Trump’s picks Rubio, Huckabee signal his approval of West Bank annexation?

Pac-Man

Barron Trump

Big Pharma-Sponsored Vaccinologist Finally Admits mRNA Shots Are Killing Millions

US fiscal year 2025 opens with a staggering $257 billion October deficit$3 trillion annual pace.

His brain has been damaged by American processed food.

Iran willing to resolve doubts about its atomic programme with IAEA

FBI Official Who Oversaw J6 Pipe Bomb Probe Lied About Receiving 'Corrupted' Evidence “We have complete data. Not complete, because there’s some data that was corrupted by one of the providers—not purposely by them, right,” former FBI official Steven D’Antuono told the House Judiciary Committee in a

Musk’s DOGE Takes To X To Crowdsource Talent: ‘80+ Hours Per Week,’

Female Bodybuilders vs. 16 Year Old Farmers

Whoopi Goldberg announces she is joining women in their sex abstinence

Musk secretly met with Iran's UN envoy NYT

D.O.G.E. To have a leaderboard of most wasteful government spending

In Most U.S. Cities, Social Security Payments Last Married Couples Just 19 Days Or Less

Another major healthcare provider files for Chapter 11 bankruptcy


Miscellaneous
See other Miscellaneous Articles

Title: World’s First Pirate ISP Launches In Sweden
Source: [None]
URL Source: http://torrentfreak.com/worlds-firs ... der-launches-in-sweden-100720/
Published: Jul 26, 2010
Author: Written by enigmax
Post Date: 2010-07-26 16:50:10 by gengis gandhi
Keywords: None
Views: 211
Comments: 15

World’s First Pirate ISP Launches In Sweden Written by enigmax on July 20, 2010

The Swedish Pirate Party, who are at the forefront of anti-copyright lobbying in Sweden, are planning to shake up the country’s ISP market. After taking over the supply of bandwidth to The Pirate Bay, Piratpartiet will now partner in the launch of Pirate ISP, a new broadband service that will offer anonymity to customers and provide financial support to the Party.

To defend the rights of BitTorrent users worldwide, the Swedish Pirate Party volunteered to provide bandwidth to The Pirate Bay after previous hosts got into legal trouble in May. At the beginning of July, the Pirate Party surprised again. Not only would they be The Pirate Bay’s new host, but they would use Parliamentary immunity to run the site from inside the Swedish Parliament.

Now the Party have made another interesting announcement. Together with technology partners, they will enter the broadband market with Pirate ISP, a new service designed to deliver consumer Internet in line with the Pirate Party’s ideals.

Gustav Nipe, student of economics, long-standing Pirate Party member and CEO of Pirate ISP told TorrentFreak that Pirate ISP is based on the hacker ontology. “If you see something and you think it’s broken you build a patch and fix it. With that as a reference point we are launching an ISP. This is one way to tackle the big brother society.”

“The Pirate ISP is needed in different ways. One is to compete with other ISPs, let them fight more for our internet. If they don’t behave there will always be someone else taking their share,” Nipe added.

Aside from the competition angle, Gustav Nipe told TorrentFreak that the Pirate ISP will maximize privacy for all its customers. Operated by ViaEuropa – the company behind the iPredator anonymity service – Pirate ISP users will remain anonymous.

The service began beta testing in the city of Lund yesterday with around 100 residents of LKF, a housing organization whose aim is to provide quality accommodations at a reasonable cost.

After the first two weeks of testing, the initial expansion aim is to take 5% of the market in Lund and then set up in further locations around Sweden. This is a reasonable aim according to Nipe, who told TorrentFreak that they start small so they can assure quality service to all their customers.

At the Hacknight conference in Malmö, Nipe told Shane Murray from nrli.tv that they will not allow the Swedish Government to monitor Pirate ISP users and will refuse to retain logs. He warned that any attempt to force it to do otherwise will result in a constitutional issue.

Nipe was also clear on how Pirate ISP would respond to outside interference, in particular that from the United States.

“They can bring on whatever they have, we will refuse to follow there. We don’t agree with what they are saying and we don’t agree with the laws they are making so if they have an issue with us, then we will have an issue – but that’s it.”

For most potential Pirate ISP customers who intend to use the service to file- share, the immediate threats will come from closer to home, primarily from Henrik Pontén at Svenska Antipiratbyrån, the Swedish Anti-Piracy Bureau. Nipe said they are prepared to deal with this challenge.

“It would be a pity to reveal all the tricks that we have, so we will save those for later. But we have ways to ensure that no customer should have to get a sad letter home from Henrik Pontén.”

For his part, yesterday Pontén seemed unimpressed.

“Our investigations have focused on people with much higher safety. The question has been asked a thousand times before,” he said. “When the police come calling, they must disclose the information.”

It seems that the wider Swedish public won’t have long to wait to discover if Pirate ISP can live up to its promises. According to Nipe they will roll out big in Sweden at the end of this summer.

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: gengis gandhi (#0)

Sounds great to me - bring it over here.

Lod  posted on  2010-07-26   17:17:13 ET  Reply   Trace   Private Reply  


#2. To: Lod, Pinguinite, gengis gandhi, all (#1)

Now you need an OS that doesn't have an NSA back door built in like Windows or Mac. Ubuntu Linux might be safe but I don't know. Neil knows Ubuntu let's ask him.

Hey Neil - is there an NSA back door in Ubuntu?

"One of the least understood strategies of the world revolution now moving rapidly toward its goal is the use of mind control as a major means of obtaining the consent of the people who will be subjects of the New World Order." K.M. Heaton, The National Educator

Original_Intent  posted on  2010-07-26   17:30:14 ET  Reply   Trace   Private Reply  


#3. To: Original_Intent (#2)

deleted

The relationship between morality and liberty is a directly proportional one.

Eric Stratton  posted on  2010-07-26   17:45:53 ET  Reply   Trace   Private Reply  


#4. To: Lod (#1)

Lod,

That would be a great idea, except that the majority of Americans are Pussy Whipped and afraid to actually exercise their freedom. Other countries actually are free, and fight for their freedom daily, Americans whimper and whine and turn on reality TV.

In Honduras they kicked out a president who decided he would circumvent their constitution, in America, the president has been proven to be a foreigner, against what their constitution allows, yet the people haven't done sh.t.

There was a survey done on American backbone, The results were compiled and announced. The result was BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA! BAAAAAAA!

BTW- we gotta get together and pop some caps soon!

The IQ and the life expectancy of the average American recently passed each other in opposite directions. - George Carlin

Luke The Spook  posted on  2010-07-26   17:49:36 ET  Reply   Trace   Private Reply  


#5. To: Original_Intent (#2)

psst:

you can't peek without it affecting your consciousness.

once you've seen an elephant, you can't un-forget it.

don't tell anyone.

its why spying only can hasten the demise of control types once they've been exposed to new ideas.

how do you keep 'em down on the farm once they've seen the lights of the city?

you can't.

__________________________________

________________________________

gengis gandhi  posted on  2010-07-26   17:51:56 ET  Reply   Trace   Private Reply  


#6. To: Eric Stratton (#3)

Yes, it makes me want to have 2 computers, one of which is NEVER EVER EVER connected to the Internet.

"One of the least understood strategies of the world revolution now moving rapidly toward its goal is the use of mind control as a major means of obtaining the consent of the people who will be subjects of the New World Order." K.M. Heaton, The National Educator

Original_Intent  posted on  2010-07-26   17:53:45 ET  Reply   Trace   Private Reply  


#7. To: Original_Intent (#2) (Edited)

Hey Neil - is there an NSA back door in Ubuntu?

Not too many have analyzed the entire source code for Ubuntu, unless you have then you would have no way of knowing for certain if a backdoor existed or not. But based on the word of those who have and those who have worked on various sections, I would say there is no back door. But then again I am just taking their word for it, unless you actually analyzed it for yourself, then you can't be 100% certain.

But there can be a back door for the processor itself bypassing the OS. So even then you can't be 100% certain unless you take the chip apart and also look at the microcode.

God is always good!

RickyJ  posted on  2010-07-26   18:22:53 ET  Reply   Trace   Private Reply  


#8. To: RickyJ (#7)

Understood. The only two certainties remain death and taxes.

"One of the least understood strategies of the world revolution now moving rapidly toward its goal is the use of mind control as a major means of obtaining the consent of the people who will be subjects of the New World Order." K.M. Heaton, The National Educator

Original_Intent  posted on  2010-07-26   18:25:58 ET  Reply   Trace   Private Reply  


#9. To: RickyJ, Original_Intent (#7)

Not too many have analyzed the entire source code for Ubuntu, unless you have then you would have no way of knowing for certain if a backdoor existed or not. But based on the word of those who have and those who have worked on various sections, I would say there is no back door. But then again I am just taking their word for it, unless you actually analyzed it for yourself, then you can't be 100% certain.

But there can be a back door for the processor itself bypassing the OS. So even then you can't be 100% certain unless you take the chip apart and also look at the microcode.

That sums it up.

Linux, unlike windows, is open source, meaning that all of the software code that runs linux is freely available to both read/inspect as well as use. If one were anal about security, one could, in theory, read through all source code that drives a server to ensure there is no spyware present, and then compile that software for use on that server.

With windows, the source code is not available, so windows users are trusting that Microsoft has not planted spyware in the OS, something aware users question given the "NSA_KEY" label found attached to windows beta pseudo-code released by Windows some years back. (And I'd add that NSA just wouldn't be NSA if they didn't approach Windows about installing spyware in Windows).

Realistically, though, reading through volumes of Linux source code is a task so daunting I'd say no one has ever done that, ever. But there are programmers looking over the code on a continuous basis, and we Linux users just go with the assumption that if there was any spyware that was ever planted in a mainstream release of Linux, it would have been found and publicized.

I suppose spyware could, in theory, be planted into a single copy of a linux release used by a specific user. But that should be protected against by hashkeys and encryption signatures deployed by the makers which most versions should be checking automatically prior to installation. Further, such spyware would not have the advantage of being tested extensively to ensure it wouldn't adversely affect the operation of whatever software it's attached to. And then you have the issue of frequent updates that could overwrite and wipe out the spyware and/or cause it's presence to be discovered.

The bottom line is that Linux security is so automated I don't think it's really possible for any one user to know with absolute certainty that a given installation of Linux has no spyware installed. Certainly Linux users go with the knowledge that it is far, far harder to sneak something into Linux than it is Windows, and that therefore Linux is *far* more certain to be secure than Windows.

Pinguinite  posted on  2010-07-26   19:52:49 ET  Reply   Trace   Private Reply  


#10. To: Original_Intent (#8)

The only two certainties remain death and taxes.

My goal is to live forever.

So far, so good!

Pinguinite  posted on  2010-07-26   19:53:22 ET  Reply   Trace   Private Reply  


#11. To: Pinguinite (#9)

Thanks for this information.

Lod  posted on  2010-07-26   20:05:56 ET  Reply   Trace   Private Reply  


#12. To: Pinguinite (#9)

If one were anal about security, one could, in theory, read through all source code that drives a server to ensure there is no spyware present, and then compile that software for use on that server.

Not trying to sound negative, but that seems almost impossible unless one were content to spend the next forty years doing a structured walk through, by which time any code would be woefully obsolete.

"The people in power will not disappear voluntarily, giving flowers to the cops just isn't going to work. This thinking is fostered by the establishment; they like nothing better than love and nonviolence. The only way I like to see cops given flowers is in a flower pot from a high window.” - William S Burroughs

Dakmar  posted on  2010-07-26   20:19:17 ET  Reply   Trace   Private Reply  


#13. To: Dakmar (#12)

Not trying to sound negative, but that seems almost impossible unless one were content to spend the next forty years doing a structured walk through, by which time any code would be woefully obsolete.

Exactly. I did address that in the post.

Pinguinite  posted on  2010-07-26   21:12:44 ET  Reply   Trace   Private Reply  


#14. To: Pinguinite (#13)

Exactly. I did address that in the post.

You did indeed, there are times I wonder if someone isn't slipping anaritalin into my cheerios.

"The people in power will not disappear voluntarily, giving flowers to the cops just isn't going to work. This thinking is fostered by the establishment; they like nothing better than love and nonviolence. The only way I like to see cops given flowers is in a flower pot from a high window.” - William S Burroughs

Dakmar  posted on  2010-07-26   21:19:25 ET  Reply   Trace   Private Reply  


#15. To: Original_Intent (#2)

No OS has perfect code, so exploits are always possible. That said, any GPL version of Linux distributes the fully compilable source code for all to examine, modify and recompile on their own. That alone gives us a huge advantage over the proprietary OS users.

I personally use a bootable USB stick with a full installed mini-version of Ubuntu (EasyPeasy) on it. Plug it into *any* pc with a USB port and the ability to boot from USB, and you have an OS you take with you at all times. Unless you directly choose to write to the machine's hard disk, you simply do not exist and have "never" existed on the system once you unplug it. Add in encryption and encrypted "drives" you can create on the OS, and you're in stealth mode, or pretty damned close to it.

"The more artificial taboos and restrictions there are in the world, the more the people are impoverished.... The more that laws and regulations are given prominence, the more thieves and robbers there will be." - Lao Tzu, 6th century BC

SonOfLiberty  posted on  2010-07-27   9:49:42 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]