The Anonymous assault against Chinese government and business websites continues, a third day of activism from #Op_Tibet and #BlackHat has hacked into 15000 emails. Details, including passwords have been revealed, exposing these targets to further attacks.
These were anonymously posted here: https://pastebin.com/3PwTx8SZ
We’d like to express our genuine thanks to everyone involved, your active solidarity with Tibet and its people is an invaluable and much appreciated support.
Shout-out to @AnonymousTibet for the heads-up on news of this
Image courtesy of @AnonymousTibet
Anonymous activists struck dozens more Chinese websites on December 5th in an action taken by #Op_Tibet & #BlackHat. Many government sites were targeted and taken offline by the attack, which was taken in support of Tibet’s just cause for national freedom and human rights. Respect to all those who participated in this immensely successful digital activism, your solidarity is greatly appreciated. Thanks to our team across Twitter for the heads-up on this and also to @AnonymousTibet for sharing the image above.
Our Twitter team @tibettruth are seeking support for a fundraiser they are running. The target is around $800, the object, to update a computer resource. If anyone wishes to contribute towards their awesome digital activism on Tibet and help them get a new laptop then head on over to the online donations page here:
Image: courtesy of https://www.facebook.com/ircp2017/
The 4th International Rangzen Conference convened in Paris, France yesterday with Tibetans and friends gathering to discuss the cause of Tibetan sovereignty, the core issue of Tibet’s cause. We wish the event all success in progressing understanding of and solidarity with the rightful struggle for Tibet’s national freedom.
Print Screen of Tweet from @anonymzmeduza
Looks like Anonymous is set to strike against Chinese government websites this February 13, an action of solidarity (on Tibetan independence day) which is being reported across Twitter. We’d like to thank @AnonymousTibet for sharing news of this and to all those hacktivists who will be taking part, including #teamriddler #Op_Tibet and #BlackHat. Your active support for Tibet’s just cause is greatly appreciated. Thanks to @anonymzmeduza for her graphic.
Image: print-screen from tweet by @AnonymousTibet
There’s a been a number of reports coming out of Tibet’s eastern regions of Kham and Amdo about Tibetans protesting against Chinese mining corporations that are causing environmental pollution and destruction of ecology. One such company is mining for gold at a mountain considered sacred by Tibetans, now it has attracted the attention of Anonymous hacktivists who have been all over social media in the past few days to notify folks that the website of that Chinese company is to be targeted. Today our Twitter account received further information on this and what’s been called ‘Operation Goldfucker’ has been launched. Many thanks to @AnonymousTibet and @teamriddler for sharing updates on this ongoing action.
The promise of Summer sunshine and blue skies is back along with music festivals, none of course bigger than England’s Glastonbury, which attracts an amazing range of musicians and artists. For a few days the magical countryside surrounding that English town hosts a tented city for over a hundred thousand folks, it is the biggest celebration on the planet, until that is Tibet regains its independence!
As our subscribers and friends will know over the past few years we’ve been raising the issue of Tibet at the festival and are very happy to announce that with the very awesome support of friends in the United Kingdom will be running a Tibet action at #Glastonbury2016.
So, working with our Twitter colleagues @tibettruth we hope to repeat the success of previous years during which in a totally fun and positive way we ensured that Tibet, its flag and struggle was not forgotten.
If you have a ticket for Glastonbury Festival, or know someone who has, and wish to help then do tweet @Glasto4TIBET #teamGlasto4TIBET
Keep it here good people 🙂