Una bala para el lado de la justicia.


http://www.youtube.com/watch?v=aFuJp_zPIlU

 _       __        ___                 __               _
| |     / /__     /   |  ________     / /   ___  ____  (_)___  ____
| | /| / / _ \   / /| | / ___/ _ \   / /   / _ \/ __ `/ / __ \/ __ \
| |/ |/ /  __/  / ___ |/ /  /  __/  / /___/  __/ /_/ / / /_/ / / / / _ _ _
|__/|__/\___/  /_/  |_/_/   \___/  /_____/\___/\__, /_/\____/_/ /_(_|_|_)_)
                                              /\_/ /
                                              \ _ /
#OpDarknet Press Release - 10/15/2011

------------------------
   Timeline of Events
------------------------
At apprx 8:30 CST while browsing the Hidden Wiki we noticed a section called Ha
rd Candy which was dedicated to links to child pornography. We then removed all
links on the website, within 5 minutes the links were edited back in by an admi
n. For this reason, we will continue to make the Hidden Wiki unavailable.
--

At apprx 8:45 CST we noticed 95% of the child pornography listed on the Hidden
Wiki shared a digital fingerprint with the shared hosting server at Freedom Hos
ting.
--

At apprx 9:00pm CST on October 14, 2011 We identified Freedom Hosting as the ho
st of the largest collection of child pornography on the internet. We then issu
ed a warning to remove the illegal content from their server, which they refuse
d to do.
--

At apprx 11:30pm CST on October 14, 2011 We infiltrated the shared hosting serv
er of Freedom Hosting and shutdown services to all clients due to their lack of
action to remove child pornography from their server.
--

At apprx 5:00pm CST
on October 15, 2011 Freedom Hosting installed their backups and restored servic
es to their child pornography clients. We then issued multiple warnings to remo
ve all child pornography from their servers, which Freedom Hosting refused to d
o.
--

At apprx 8:00pm CST on October 15, 2011 despite new security features,
we once again infiltrated the shared hosting server at Freedom Hosting and stop
ped service to all clients.
--

------------------------
     Our Statement
------------------------
The owners and operators at Freedom Hosting are openly supporting child pornogr
aphy and enabling pedophiles to view innocent children, fueling their issues an
d putting children at risk of abduction, molestation, rape, and death.

For this, Freedom Hosting has been declared #OpDarknet Enemy Number One.

By taking down Freedom Hosting, we are eliminating 40+ child pornography websit
es, among these is Lolita City, one of the largest child pornography websites t
o date containing more than 100GB of child pornography.

We will continue to not only crash Freedom Hosting's server, but any other serv
er we find to contain, promote, or support child pornography.

------------------------
      Our Demands
------------------------

Our demands are simple. Remove all child pornography content from your servers.
Refuse to provide hosting services to any website dealing with child pornograph
y. This statement is not just aimed at Freedom Hosting, but everyone on the int
ernet. It does not matter who you are, if we find you to be hosting, promoting,
or supporting child pornography, you will become a target.

------------------------
     Images & Misc
------------------------
Dead Server Screenshot: http://i55.tinypic.com/vy9w7k.jpg
--
Freedom Host PR Screenshot: http://i53.tinypic.com/o5qlip.jpg
--
Our Manifesto: http://www.youtube.com/watch?v=aFuJp_zPIlU
--

  #Antisec | #Anonymous | #FreeTopiary | #AnonOps | #FreeAnons | #OccupyWallSte
  et | #OWS

We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect us.

------------------------
   Server Information
------------------------
phpinfo() of FreedomHosting:
System  FreeBSD server 8.2-RELEASE-p3 FreeBSD 8.2-RELEASE-p3 #0: Tue Sep 27 18:
45:57 UTC 2011 root@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC amd64
Build Date      Aug 26 2011 03:00:30
Configure Command       './configure' '--with-layout=GNU' '--localstatedir=/var
' '--with-config-file-scan-dir=/usr/local/etc/php' '--disable-all' '--enable-li
bxml' '--with-libxml-dir=/usr/local' '--with-pcre-regex=/usr/local' '--with-zli
b-dir=/usr' '--program-prefix=' '--disable-cgi' '--with-apxs2=/usr/local/sbin/a
pxs' '--with-regex=php' '--with-zend-vm=CALL' '--disable-ipv6' '--prefix=/usr/l
ocal' '--mandir=/usr/local/man' '--infodir=/usr/local/info/' '--build=amd64-por
tbld-freebsd8.2'
Server API      Apache 2.0 Handler
Virtual Directory Support       disabled
Configuration File (php.ini) Path       /usr/local/etc
Loaded Configuration File       /usr/local/etc/php.ini
Scan this dir for additional .ini files         /usr/local/etc/php
Additional .ini files parsed    /usr/local/etc/php/extensions.ini
PHP API         20090626
PHP Extension   20090626
Zend Extension  220090626
Zend Extension Build    API220090626,NTS
PHP Extension Build     API20090626,NTS
Debug Build     no
Thread Safety   disabled
Zend Memory Manager     enabled
Zend Multibyte Support  disabled
IPv6 Support    disabled
Registered PHP Streams  php, file, glob, data, http, ftp, zip, compress.zlib
Registered Stream Socket Transports     tcp, udp, unix, udg
Registered Stream Filters       convert.iconv.*, string.rot13, string.toupper,
string.tolower, string.strip_tags, convert.*, consumed, dechunk, zlib.*

Configuration
apache2handler
Apache Version  Apache
Apache API Version      20051115
Server Administrator    you@example.com
Hostname:Port   xqz3u5drneuzhaeo.onion:0
User/Group      www(80)/80
Max Requests    Per Child: 10000 - Keep Alive: off - Max Per Connection: 100
Timeouts        Connection: 900 - Keep-Alive: 60
Virtual Server  Yes
Server Root     /usr/local
Loaded Modules  core prefork http_core mod_so mod_authz_host mod_file_cache mod
_cache mod_disk_cache mod_filter mod_deflate mod_env mod_expires mod_headers mo
d_setenvif mod_mime mod_status mod_autoindex mod_dir mod_alias mod_rewrite mod_
bw mod_php5 mod_alias_basedir mod_vhost_alias_frdmhst

Apache Environment
Variable        Value
HTTP_HOST       xqz3u5drneuzhaeo.onion
HTTP_CONNECTION         close
HTTP_USER_AGENT         Mozilla/5.0 (Windows NT 6.1; rv:5.0)
HTTP_ACCEPT     text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
HTTP_ACCEPT_LANGUAGE    en-us,en;q=0.5
HTTP_ACCEPT_CHARSET     ISO-8859-1,utf-8;q=0.7,*;q=0.7
HTTP_DNT        1
HTTP_COOKIE     visitz=0; sort=0a
PATH    /bin:/usr/bin:/usr/ucb:/usr/bsd:/usr/local/bin
SERVER_SIGNATURE        no value
SERVER_SOFTWARE         Apache
SERVER_NAME     xqz3u5drneuzhaeo.onion
SERVER_ADDR     10.0.1.2
SERVER_PORT     80
REMOTE_ADDR     10.0.1.2
DOCUMENT_ROOT   /home/fh/www
SERVER_ADMIN    you@example.com
SCRIPT_FILENAME         /home/fh/users/l/i/lolitacity/www/index.php
REMOTE_PORT     56818
GATEWAY_INTERFACE       CGI/1.1
SERVER_PROTOCOL         HTTP/1.0
REQUEST_METHOD  GET
QUERY_STRING    no value
REQUEST_URI     /users/lolitacity/index.php
SCRIPT_NAME     /users/lolitacity/index.php

http://pastebin.com/T1LHnzEW