Welcome to AnonOps

AnonOps (Anonymous Operations) IRC is an international communication platform frequented by Anonymous and other activists. You can join our network using your own IRC client or our webchat.
Have questions or need connection help? Try FAQ or Tutorials for more information.

Here's To Our Beloved owen

No doubt you were expecting an outpouring of grief before this message. Quite frankly, I wish I could but there are no words to express how much we're grieving and how much of a loss this is to the cause. For those that can still express themselves then please send messages of support and more importantly stories about how much owen touched your life. All we can do is keep up the good fight that he started and try to keep his dreams alive. http://www.forevermissed.com/dennis-owen-collins/ Yes, I'm afraid you do have to register to post but real details are optional. ;) Requiescat In Pace owen, forever you'll be in our hearts.

Removal of Plaintext IRC Access

By the end of this week (Saturday, June 13th) we will have disabled access to our IRC network via plaintext. This means that if you want to connect to our network you must be using TLS on port 6697. The reason for this change is simple: TLS is something everybody should be using. Virtually every modern IRC client supports TLS, this includes mobile clients too. All clients (including authorized user bots) must be configured to use TLS or you won't be able to connect. To verify if you are using TLS check that you are connecting to port 6697 in your client, or if you are currently connected whois yourself and look for " is using a secure connection".

Cipher Updates

We have prioritized the cipher list accepted by our servers to ensure higher order ciphers are negotiated first if possible. We have disallowed RC4, MD5, etc. On connecting to the IRC, the server notice window will show you the cipher your client has negotiated with our server. An example would be: *** You are connected using SSL cipher "DHE-RSA-AES256-GCM-SHA384. In the end, its YOUR client that determines the cipher used so every user should verify they are using a strong one. More information can be found on our security page under the TLS section.
We have also disabled the CTCP function for all users due to abuse. The proper mode will be set on all users connecting to our network.

TLS Updates - IRCds

Starting at 2AM GMT on Thursday Feb 19th we will be upgrading the TLS libraries in our IRCds, we will also be generating new certificates and private keys. Once this upgrade is done all servers will have TLS 1.2 available and over time we will tweak the cipher priorities to stay up to date with the strongest options available. This upgrade is meant to offer users better privacy when using TLS assuming their client negotiates a strong cipher. We will be using only 4096 bit RSA keys, and certificates with SHA256 hashing after this upgrade. If you verify our certificate fingerprints note that these will change, we will tweet out the new certificate fingerprints after the upgrades are complete.

TLS Updates - Web Resources

Due to recent revelations leaked from a three letter agency we have taken some steps to improve security of the TLS in use on our web resources. While all of our web resources are behind a CDN called Cloudflare we still want the origin/back end connections to be cryptographically strong. For this reason we have done the following: changed all keys to RSA 4096 bit, deprecated SHA1 and changed certificates to SHA256 and prioritized strong ciphers such as ECDH. Stay tuned for more information on TLS updates to our IRCd infrastructure.

IRCv3

Recently we enabled limited IRCv3 support on our servers. IRCv3 is an attempt to modernize the IRC protocol and make it more efficient. We currently support the away-notify extension and we will look at enabling other extensions in the future. In order to take advantage of these extensions your client needs to support them. Check out ircv3.org for more info.

New Webchat and Other Helpful Things

Webchat users are already aware but for the rest of you this is news. Last week we switched to a different webchat interface. This one is much nicer, more user friendly and has some new features unavailable in the old qweb interface. Check it out by clicking the webchat button in the nav menu. We have also been busy adding some new tutorials for the newblood site. We have added one for irssi, one for virtual machines and have made significant additions to the android page to accomodate the increasing number of droid users. We hope you like them. Translations of these new pages are in progress and should be available shortly. On the less visible technical side, we have upgraded some things in the backend and in the load balancing to improve connectivity and uptime. Upgrades to the radio are also underway. As we do not wish to take down the service entirely, expect a few bugs as this happens. Be patient. The end result is what matters, after all.

The Heartbleed Bug and Other Nasty Stuff

Unless you have been living under a rock or just recently emerged from the basement, you have heard about this bug. Make no mistake, it is very dangerous. Much is still unknown at this point but what info is available needs to be dealt with and fast. A lot of information has come out so start checking this info against your systems. Figure out what is vuln and fix it. For us, Cloudflare handled the public facing side of our web services. The backend had updated SSL installed immediately. Necessary changes were made to nginx, certs revoked and reissued. The IRCd servers use GnuTLS. They were not vulnerable but we updated them anyhow. We did our part. Now you do yours. You need updated OpenVPN clients, IRC clients, etc. Update your own servers. Any application that uses the affected OpenSSL libraries needs to be updated or disabled until updates become available.

Hypocrisy At It's Finest

I don't think there is any way to describe this other than the few words in the title. For a while now we have watched our governments prosecute Anonymous individuals for conducting DDoS attacks, but it seems another group should be facing charges too. We are referring to the government. Full story here. We are appalled by this revelation that a government would prosecute their citizens for a crime but commit the same crime themselves only to go unpunished. Edward Snowden is a brave individual fighting for what he believes in and words cannot express how thankful we are for what he has done. We can only hope that this leak helps to aid those who have been so wrongly prosecuted in their legal battles.

Remembering Aaron

A year ago, the online community learned of a terrible tragedy. Aaron Swartz, hounded by the US goverment and threatened with decades behind bars, took his own life. Our sympathies go out to his family and friends during this emotional and difficult time. He contributed his time and intelligence to create a more open place, to connect more people together and further allow the free flow of information to those who seek to learn. Information should not be a commodity, packaged and sold only to those who can afford to do so by greedy corporations or hidden away from the people by governements who spend our money to spy on us. As the anniversary of his death passes, we ask that you join us in taking a stand.
February 11, 2014 is the day we fight back. We must all speak out against the obliteraton of our privacy by governments everywhere and to stop the persecution of activists by vindictive governments.
It is time we are heard.

Network Rules

You are free to discuss whatever you want on our network.
We do not control what our users discuss as long as they adhere to these simple network rules.

Network News

31st
Jan

Update

Server upgrades to the IRCd (now at version 2.0.15) and the backend infrastructure (ssl and ssh, nginx, etc) including new kernels have been completed. The layout of the alternate language sites is underway. Each will have their own subdomain which should improve navigation and allow more efficient content changes. These updates will be completed soon. Also, upgrades to the radio is well underway, allowing additional concurrent streams and archiving of past shows.

11th
Jan

Update

Updates to content on newblood and main site pages. Added a subdomain for french newbies https://newbloodfr.anonops.com Configured webchats to work better on mobile devices. Some other technical stuff, kind of boring but will improve performance

23th
Aug.

#OpNewBlood Website

Previously the website for #opnewblood (a popular channel on the network) was hosted on pastehtml. We have now moved it to our servers and updated the existing content
Many have been working hard to add new pages on important subjects. Check out the new site at https://newblood.anonops.com

23rd
Aug

High Availability

Over the past week or so we have been working on adding some resiliency into our web based systems. We now have automatic failover in place for both webchat, and our website content.
If one of our backend servers fail, our front end load balancers automatically fail over to any other available backend servers! This means much less downtime, and no intervention required on our part when systems go down.

24th
June.

IPv6

We have enabled IPv6 on most of our services now including this website and IRC.

26th
Apr.

Website Updates

Updates to the website have been completed with the addition of new client tutorials.

23th
Feb.

Full SSL

We're happy to announce that both our website and webchat are now fully SSL-enabled for your safety. SSL is enforced on both the website and webchat.

10th
Oct.

New Tor hostname

New Tor server has been set up with a more shiny hostname, the new hostname is anonops532vcpz6z.onion. Your old username/hash details are transfered and are working.

SSL Certificate