Welcome to the web site of Deep Tech Group! This is a landing page from Clearnet into our community. We are building technical base for resistance to the total surveillance and control. Learn more about our targets and tasks, provided services, current projects and how to participate. We are glad to meet every IT professional or enthusiast – admin or hacker, developer or web designer.
Defense from surveillance & control
Mass surveillance turns into programming of behavior. Targeted control is increasing too over independent activists and communities. Let’s defend ourselves together!
Common technical base
Uniting the efforts allow people and independent groups to get secure IT infrastructures and enhanced anonymizing software.
Inclusive open community instead of elitist or political group attracts maximum of people and resources.
Ensuring anonymity and security of community members via providing only hidden services that do not store metadata.
Defense from surveillance and control
Shortened version of the article. Full text in Russian is here.
In the era of globalization the systems for governing societies become unified. The same trend is observed in different countries. It can be characterised as increasing control. Two main directions stand out:
- Increasing controllability of the society as a whole (mass, crowd control)
- Control for individuals and independent groups (targeted control)
The basis of the modern mass control is the mass surveillance system. It was built under cover of advertising business and war against terrorism. Important elements of the system are CCTV cameras, mobile phones, electronic money, tracking in the Internet (including social networks and messengers). Surveillance cameras allow identifying cars and faces, together with mobile phones tracking people in the real world. Information about visited sites and bought products allows building full portait of an individual. Socail networks and messengers allow monitoring his circle of contacts.
All this information is processed by artifical intelligence and used in a rating system. Currently such systems are already used for example by banks to identify creditworthiness of an individual. Generalizing this system to the whole social life authorities create a method of total and direct programming of people’s behaviour. Each and every deviation from required behavior is tracked and reflected to the individual reducing his rating. Rating determines person’s status in the society. Low rating prohibits access to resources. Moreover, the authorities gain the ability to detect and prevent any crime including ‘thoughtcrimes’. This isn’t a bad sci-fi movie, such system is currently tested in China.
Targeted control for individuals and independent groups is also increasing. Technologies for person identification together with ban of anonymity are implemented everywhere. Censorship, blockings thrive. Anonymity is a target of criminalization and privacy becomes severely limited at the legal level. Search, seizure, arrests, shutdown of independent services is a common practice. In special cases – hacking into communities’ infrastructure and user devices.
From all said above we conclude that global system of authority aims at total control of the human. This situation is unacceptable to us – those who respect the free will, who do not want to be a programmable biorobot. That is why defense from this surveillance and control systems is paramount to us.
Full article in Russian is available here.
Common technical base
The complex problem of total surveillance and control requires complex solution. It should use political, technical and other means. But at the moment we do not see any uniting political platform. Platform acceptable for all who are willing to work on the solution. Because of that we suggest to unite technical efforts of people and independent communities. Of course, we’re more interested in participants from technical communities – communities of developers, researchers, hackers, sysadmins and so on. But political communities can join too via their technical representatives.
Political fight should be left outside the group. This will help avoid heated discussions and tensions within the tech group.
DeepTech group focuses on following areas:
- Providing public services together with their templates and deployment guides
- Tech support by community
- Mutual aid of communities with creating and maintaining their IT infrastructures
- Research and development in practical information security, anonymity and privacy
DeepTech group is created as an open, inclusive community. Community of technically skilled people capable of solving practical tasks. A person with any political views can become a member of our community. The only requirement is willing and interest in solving technical tasks within our large agenda of anti-surveillance.
We are just forming our community now. Searching for people with different skills and roles. We are sure there is enough work for all – experienced professionals, enthusiasts and even newbies.
It isn’t possible to get away without any boundaries. In our community these are
- Child porn and other similar crimes
If detected, such participants will be expelled from the community.
See more about how to participate.
One of the main work areas of DeepTech group is providing services for people and communities. In Russia as in many places around the world spectacular arrests of activists or even random persons are a common practice to spread fear among people. Under these conditions we think it does not make sense to provide services using our real names. Working on anonymity and privacy haven’t been fully forbidden, but this can happen in near future (at least in Russia).
So, administrators of the group work under pseudonyms. And our services are anonymized. This protects both users and administrators. We do not provide services that allow to identify their users or server location (via IP address, phone number etc). These are location hidden services in Tor (.onion) and eep-sites in I2P (.i2p).
Also we care about minimizing collection and storage of user’s metadata. This is information about how our services have been used, when and what for. For example, our forum does not show connection status of the users (online/offline), posts do not have exact timestamp – only month and year. This reduces risks of passive deanonymisation of users through time-based correlations.