http://digital-intifada.blogspot.com/2012/04/digital-intifada-exclusive-interview.html

Tuesday, 3 December 2013

## ohai feds!!! we're still alive. ## ## the best trick ever pulled was to convince FBI they can catch us ##

  1.                                                    
  2.     ----------------------------------------------------------------------
  3.     ##  "There come a time, when good men must wear mask.....kemosabe"  ##
  4.     ----------------------------------------------------------------------
  5.        _  _                  __  .__                          #FREEHAMMOND
  6.     __| || |_______    _____/  |_|__| ______ ____   ____      #FREEASSANGE
  7.     \   __   /\__  \  /    \   __\  |/  ___// __ \_/ ___\     #FREECHELSEA
  8.      |  ||  |  / __ \|   |  \  | |  |\___ \\  ___/\  \___     #FREESNOWDEN
  9.     /_  ~~  _\(____  /___|  /__| |__/____  >\___  >\___  >    #FREEBARRETT
  10.       |_||_|       \/     \/             \/     \/     \/     #FREEANONS16
  11.                                                               #FREELULZSEC
  12.     ----------------------------------------------------------------------
  13.     ----------------------------------------------------------------------
  14.     ##              ohai feds!!! we're still alive.                     ##
  15.     ## the best trick ever pulled was to convince FBI they can catch us ##
  16.     ----------------------------------------------------------------------
  17.          every single line of code is, today, equal to a magic spell.
  18.            Magic that's able to change how things work around you,
  19.                     and eventually...the world itself.
  20.     ----------------------------------------------------------------------
  21.        
  22.         VIDEO https://vimeo.com/80918147       
  23.        
  24.     hi guise!!! <333
  25.    so well...
  26.    Hammond was sentenced to 10 years of prison for being a
  27.    political dissident, doing what he felt was the right thing.
  28.    it was the second time he was jailed cause some coward betrayed him.
  29.    you are probably asking yourself: why did he start hacking again after
  30.    being in prison the first time? well, Hammond was an honest idealist,
  31.    who blindly hated a system that rips off all freedom and humanity
  32.    from us. and he hated this to the point of trading
  33.    his own freedom on the fight, because nobody can understand better
  34.    how precious and fragile freedom is, than those ones who have lost theirs once.
  35.        
  36.    now he is being tortured by prison authorities and he is often kept in
  37.    total isolation whilst the coward of Sabu lives dressed on silk
  38.    kimonos and gets pimped in secret by FBI.
  39.    yeah we know, rapists and other shits get less punishment.
  40.    things are fucked up, but nobody seems to care to change this.
  41.    
  42.    so..
  43.    our greetings then for all those ones who have sacrificed their own
  44.    comfort and freedom to tell us the truth.
  45.    hammond, julian, snowden, chelsea(the hacker former known as brad),
  46.    aaron and many others around the world, specially those ones
  47.    whose existence will never be noticed by the world, those who save
  48.    our world everyday and those around the world who perhaps we'll never
  49.    know and who every single day make what they believe is the
  50.    right thing even if that means going against their own interests.
  51.    
  52.    freedom of choice. that's what made of us humans.
  53.  
  54.                
  55.        
  56.    so now that Snowden has stepped up to prove what we have been tried to
  57.    tell you for the last years, we consider ourselves on vacations.
  58.    work is still going on but, now we've got rid of the FBI influence,
  59.    we decided to play things with our own timings and rules.
  60.    so what today?
  61.    today we want to share some thoughts, concepts and stuff about
  62.    safe irc/im communications and openssl.
  63.    stuff that could be useful for our fellows to avoid some problems.
  64.    and bringing the mpOTR gift to our IRC/IM communications.
  65.  
  66.    THE GIVING STUFF THINGIE...IS THAT WHATS ABOUT THANKSGIVING, INNIT?
  67.    
  68.    (if you dont care about details and just want the toy and candy
  69.    just skip to the 'WHAT THE FUCK THEN fuckNSA DOES????' part)
  70.      
  71.    
  72.    Background
  73.    ----------
  74.    
  75.    well all this started by accident, it's a funny story  
  76.    involving sex, hacking, japanese girls, NSA superspookcomputers,
  77.    Julian Assange running naked through the underground of london
  78.    and General Keith Alexander's personal pink tutus collection.
  79.    so here we go:
  80.    Once upon a time, in some remote irc channel on some hidden service,
  81.    a bunch of guise trying to trade cool stuff were
  82.    dragged into the following conversation
  83.    (convo lightly changed for the sake of privacy):
  84.        
  85.           xx  > do u have otr?
  86.           yy  > hold on, im sitting on a pwnd box, lemme check
  87.           yy  > nah, cant quick install it asap. i could compile and install it
  88.           yy  > but no time for it
  89.           yy  > what about blowjob?
  90.           xx  > ...
  91.           yy  > blowjob.pl i mean
  92.           xx  > lololol
  93.           yy  > u irssi?
  94.           yy  > well its a quicky one at least
  95.           xx  > blowfish is useless man
  96.           yy  > anyway its all fine about otr but not sure about how it really works
  97.           yy  > didnt check the code yet
  98.           yy  > but i would prefer something i can tinker with, and easier to move with
  99.           yy  > when im jumping box to box so.. the perl script
  100.           xx  > okok at least gimme 2 min, can u check if you have some Crypt:: algo installed
  101.           yy  > wait
  102.           yy  > can get Rijndael quickly
  103.           xx  > ok cool
  104.           xx  > get it installed and gimme 2 min
  105.           xx  > ok check this paste https://pastee.org/xxxxx
  106.           xx  > there, just a modified blowjob to use AES instead of blowfish, defaults to 256
  107.           xx  > ok?
  108.           yy  > got it
  109.           xx  > go to the other win and gimme a pass
  110.           yy  > ok
  111.        
  112.     ok..yeah..it was a quick solution to keep going on with the chat, thou not the best one.
  113.     even when we were able to deploy a stronger cipher algorithm we were lacking
  114.     of some important part, like solving a shared passphrase exchange.
  115.     so we kept thinking about it. yeah we love 2 irc, theres no many popular
  116.     options for encryption on it, we could use otr for irssi thou the current
  117.     implementation seem lil bit buggy, otr 2 protocol look quite good but it's
  118.     not always available for every situation sadly and even when ppl use it
  119.     not everyone understand whats going on on the background, it just works
  120.     for many ppl and thats enough but well perhaps some other ppl would prefer
  121.     to get more control about whats going on and probably tweak and modify
  122.     it as they think it fits better, like a group using their own
  123.     diffie-hellmann parameters or ciphers or whatever. so basically we were
  124.     discussing later this issue whilst modifying the original blowjob.pl
  125.     it was funny.
  126.     so we ended up with some PoC about many ideas we were discussing about.
  127.     we read the OTR 2 protocol, we discussed about cipher algorithms,
  128.     about openssl thingies, about NSA, FBI and other shits.
  129.     what follows its the product of that dialog.
  130.  
  131.     Goddess on charge: Rinko Kikuchi  B====D
  132.        
  133.        
  134.     first:
  135.     we tried at the beginning to rely mainly on openssl
  136.     cause it's installed by default on many systems
  137.     but the first problem was about what could be leaked and
  138.     watched through the process list, yeah we could
  139.     have just used files for everything but at the end
  140.     we ended up lurking on many shits and discovering
  141.     some interesting stuff. so we chose Camellia as cipher,
  142.     https://en.wikipedia.org/wiki/Camellia_(cipher)
  143.     cause we don't trust AES anymore.
  144.  
  145.     check the camellia code please. original camellia.c, camellia.h and
  146.     camellia on pure perl are available on the repository
  147.     but you can google them too.
  148.        
  149.     we use Camellia 256
  150.        
  151.     Crypt::Camellia
  152.     or
  153.     Crypt::Camellia_PP
  154.        
  155.     we strongly suggest you to install them by yourself, by the alikes of using cpan,
  156.     but, for a quickie, we made some ready-to-go .deb packages
  157.     containing the originals without modification, cause well,
  158.     it seems there aren't .deb packages available on the
  159.     debian repositories. and when you're using some stuff temporarily sometimes
  160.     you don't have time to cpan burdens.
  161.        
  162.     so well then we discovered that the Crypt::CBC's password based key derivation fn
  163.     was inspired by the openssl passphrase base key derivation fn and the use of a salt
  164.     so using salts are good. but well, Crypt::CBC shared the fate of openssl...
  165.     they both use md5 as default to hash the passphrase and salt.
  166.     and we all know md5 has many issues about collisions and shits.
  167.     if you are using openssl for symmetric encryption,
  168.     it defaults to use md5 on 1 single round.
  169.     eventually ppl could use the undocumented '-md <digestAlgorithm>'
  170.     flag to change this default.
  171.     thought even when it would be possible to,    
  172.     for example:                                                                    
  173.                                                                                
  174.     cat testtxt.txt | openssl enc -camellia-256-cbc -e -a -salt -md sha512  
  175.    
  176.             -----------------------------------
  177.            | extracted from openssl's enc.c:   |
  178.            |                                   |
  179.            | if (dgst == NULL)                 |
  180.            |     {                             |
  181.            |      dgst = EVP_md5();            |
  182.            |      }                            |
  183.             -----------------------------------
  184.    
  185.     < kayla> lololol md5    
  186.                                                                            
  187.     you are still limited to use 8 byte salts, even if you try to manually  
  188.     set, for example, a 16 byte salt manually like this:                  
  189.                                                                              
  190.     cat testtxt.txt | openssl enc -camellia-256-cbc -e -a  \                
  191.                             -S 9e5de8d47165d15c46a4dca04c3352ce -md sha512  
  192.                          
  193.     because this                      
  194.          --------------------------------------                      
  195.         | extracted from openssl's evp.h:      |
  196.         |                                      |
  197.         | #define PKCS5_SALT_LEN            8  |                        
  198.         |                                      |
  199.          --------------------------------------          
  200.        
  201.      -------------------------------------------------------------------------
  202.     |  and also this                                                          |
  203.     | again from openssl's enc.c:                                             |
  204.     |                                                                         |
  205.     | EVP_BytesToKey(cipher,dgst,sptr,                                        |
  206.     | (unsigned char *)str,                                                   |
  207.     |   strlen(str),1,key,iv);                                                |
  208.     |                                                                         |
  209.     | so checking... evp_key.c :                                              |
  210.     |                                                                         |
  211.     | int EVP_BytesToKey(const EVP_CIPHER *type, const EVP_MD *md,            |
  212.     |        const unsigned char *salt, const unsigned char *data, int datal, |
  213.     |        int count, unsigned char *key, unsigned char *iv)                |
  214.     |                                                                         |
  215.     |   [...]                                                                 |
  216.     |                                                                         |
  217.     |   for (i=1; i<(unsigned int)count; i++)                                 |
  218.    |       {                                                                 |
  219.    |       if (!EVP_DigestInit_ex(&c,md, NULL))                              |
  220.    |           goto err;                                                     |
  221.    |       if (!EVP_DigestUpdate(&c,&(md_buf[0]),mds))                       |
  222.    |           goto err;                                                     |
  223.    |       if (!EVP_DigestFinal_ex(&c,&(md_buf[0]),&mds))                    |
  224.    |           goto err;                                                     |
  225.    |       }                                                                 |
  226.    |                                                                         |
  227.     -------------------------------------------------------------------------
  228.  
  229.    > really guise... defaults to count = 1 ?
  230.     > #?@!%    
  231.  
  232.  
  233.     wat the fuck was that?
  234.     fuck with pkcs5 on these fuckin crazy times of mass surveillance
  235.     if this was a decision made to keep retro-compatibility,
  236.     why dont we also make enc algo to default to the caesar cipher?
  237.     so we could easily decrypt also our old papers from the roman empire times, huh?
  238.  
  239.                                                                          
  240.     we wrote a patch for the openssl commandline utility thought        
  241.     well...lets be honest:                                                      
  242.     we don't think it will make it through mainstream considering it would      
  243.     be coming from us (we tried on the past, didnt work)
  244.     but whoever from the OpenSSL community would be          
  245.     able to easily implement it.                                                
  246.     the patched version works on this way:                                      
  247.     example:
  248.                                                                                
  249.     cat testtxt.txt | openssl enc -camellia-256-cbc -e -a -fuckNSA              
  250.                                                                                
  251.     this enable to default 16 byte salts and the use of the algo sha512 breaking
  252.     pkcs5 lines but wtf anyway                  
  253.     longer salts should be available to be used ofc.                            
  254.     also (currently being tested) it would be possible to do symmetric          
  255.     encryption with 2nd-stage-passphrases, derived from an additional extra    
  256.     function that complements the standard method                              
  257.     Example:                                                                    
  258.     cat testtxt.txt | openssl enc -camellia-256-cbc -e -a  \                    
  259.                                      -fuckNSA -KeithAlexanderLovesCocks      
  260.      
  261.     (yeah he and his transplanted hair loves cocks )                              
  262.     will pass the given passphrase to the 'KeithAlexanderLovesCocks'            
  263.     function (a PoC already implemented into the 'fuckNSA.pl' irssi perl script
  264.     for secure communications and also into the simple commandline              
  265.     encryption utility 'nonsa.pl')                                              
  266.     this function will derive a new passphrase (or proto-key seed)              
  267.     that will...seed(sic) the iv and key derivation standard procedure.        
  268.     think about it as something that produces complex passphrases              
  269.     from (possible) weaker and simpler ones; eventually forcing an adversary    
  270.     aka FBI, NSA, Teletubbies, Cartman, etc...                                  
  271.     into building tables for all possible combinations of the                  
  272.     sha512 output (for example) and blah blah...
  273.     or well..at least add the fucking scrypt snippet into it....  
  274.     you can use also just go gpg, way. installed by default on many *nices
  275.     thou that doesnt change the fact openssl must modify some basic stuff to
  276.     fit modern times.
  277.    
  278.     so well, we touched Crypt::CBC to address this whole thingie,
  279.     enabling on it 16 byte long salts and sha512 digest algo.
  280.     We make available our version of CBC.pm in the repository
  281.     and we made a .deb package to quick install it. (we worked around the
  282.     security of dh-make-perl to forge it)
  283.     we strongly suggest you to read the code first, verify you r fine with it
  284.     and then install the .pm by yourself.  
  285.    
  286.     so thats all about perl modules needed to run our fuckNSA.pl
  287.     we use those 2 modules, also check if your Digest module is updated.
  288.     and we kept openssl for dh and rsa keys stuff to avoid demanding
  289.     more perl modules to be installed, etc.
  290.    
  291.     HERE THE CANDY!!!
  292.    
  293.     WHAT THE FUCK THEN fuckNSA DOES????    ..mpOTR man, its all about mpOTR
  294.     -----------------------------------
  295.    
  296.     it implements advanced encryption over IM/IRC communications resolving
  297.     the how-sharing-the-fucking-passphrase problem & deploying an inspired OTRv2
  298.    key exchange agreement. it uses Camellia256, DH keys of 4096 bits, RSA
  299.    keys of 4096 bits and sha512, sha256, etc. it produces 2 keys: one for encrypted
  300.    communications and the second one to use on file encryption (in case
  301.    ppl need to share stuff) it implements a flexible mpOTR solution, flexible
  302.    enough to be easily hackable, letting a group of ppl on a given channel for
  303.    example to exclude a non-trusted part (aka FBI snitch) from knowing other keys
  304.    used for that channel, the use of temporary common keys to reduce flooding, the use
  305.    of individual keys and all & whatever u prefer to do. If a computer belonging to
  306.    some individual is seized by FBI, only last keys used would be compromised and only
  307.    those ones shared with some individuals for the last conversation the individual
  308.    has participated, therefore not compromising conversations that happened between
  309.    other individuals on the same channel at different times. Users retain full control of the
  310.    decisions to make. the DH parameters are easy to change, so different
  311.    groups can easily employ their own parameters with keys of 16384 bits for example.
  312.    it offers good verbosity and keep history of your peer's fingerprints in case
  313.    you need to check it later, when you go full paranoid, and many other etc & etc...
  314.  
  315.    go to
  316.    https://github.com/j0hnnMcCock/fuckNSA  
  317.    
  318.    so:
  319.    1 READ THE FUCKING CODE
  320.    2 READ THE FUCKING CODE
  321.    3 READ THE FUCKING CODE
  322.    4 IMPROVE IT AND ENJOY IT
  323.  
  324.  
  325.    
  326.    also...wtf Keith Alexander does with his hair???
  327.    stop spending our taxes into your hair transplantation ops
  328.    we know that your hair is coming from your ass!!!
  329.    :(  
  330.    D:
  331.    
  332.    how to install:
  333.  
  334.    go here
  335.    https://github.com/j0hnnMcCock/fuckNSA    
  336.    
  337.    put fuckNSA.pl on your irssi script folder for example
  338.    like:
  339.    ~/.irssi/scripts/fuckNSA.pl  
  340.    and then:
  341.    /script load fuckNSA.pl  
  342.    /fucknsahelp  
  343.    
  344.    < kayla> that was silly to explain...  :o
  345.    
  346.    requirements:
  347.    install Crypt::Camellia or Crypt::Camellia_PP
  348.    the pure perl version can slow down things lil bit
  349.    but perhaps it's the simplest to get installed
  350.    quickly on the run
  351.    
  352.    put CBC.pm and Camellia_PP.pm
  353.    on a 'Crypt' folder where you have your perl modules
  354.    example on freeBSD:
  355.    /usr/local/lib/perl5/5.*/Crypt/CBC.pm
  356.    /usr/local/lib/perl5/5.*/Crypt/Camellia_PP.pm
  357.    
  358.    (yeah fuckNSA.pl works not only on Linux but on freeBSD too,
  359.    and it rocks there)
  360.    
  361.    it works on OSX too but...
  362.    
  363.    # ATTENTION OSX USERS #
  364.    Apple couldnt have better idea than fuck openssl even more compiling the
  365.    default installed version without 'pkeyutl' nor camellia algorithm neither
  366.    why? WHY APPLE???
  367.    so theres no option guise and you need to install your own openssl thingie
  368.    check internetz for that, its not that difficult.
  369.    
  370.    
  371.    ofc you can modify the
  372.    whole thingie to tap on gpg instead. so be free to do what u want.
  373.    
  374.    
  375.    check the 'INSTALL' file for more info
  376.    if you want to change from Camellia_PP to Camellia
  377.    dont forget to modify fuckNSA.pl (commenting the option)
  378.    
  379.    tips:
  380.    tune the irssi builtin flood control to speed up the key exchange process
  381.    example:
  382.    { cmds_max_at_once = "256"; cmd_queue_speed = "15ms"; }
  383.    
  384.    
  385.     code is easy hackable to make suspected fbi snitches or regimes'spiez (for example)
  386.     into believing they ve been infiltrating a conversation
  387.     whilst sensitive parts of it
  388.     are being modified on the fly for them.
  389.    
  390.     TO-DO and how to help:
  391.     port fuckNSA for libpurple and other clients (pl0x help, we r lazy cunts)
  392.     further testing and fix whatever appearing buggy, remember we
  393.     wanted to release this for thanksgiving so it needs more testing & blah blah
  394.    keep improving it
  395.    write tutorials, explain others how to use it, read the code first.
  396.    ...hm....READ THE CODE FIRST.
  397.    
  398.    https://github.com/j0hnnMcCock/fuckNSA  
  399.    SHA256SUMs    
  400.  
  401. b276785b0f84bc2713122d8b9588c44a8f3b63155a97b8b57547b9f63674705e  fuckNSA.pl       
  402. 33a5bb69f438b1e8dd05799531fe9d726c181d2662a0237ca69992f7387e8c59  nonsa.pl    
  403.    
  404. 77c3c8cca0476965e82327c55e136b09e1cb876ca4bb333dfa538b5ad4818af9  Camellia_PP.pm
  405. 5b24c307141d78b8224a21f3abd1efb099bdc821709520349bfa6b31bb241644  CBC.pm
  406.  
  407. 43f50d2faa7fc28ca2a0267fa7456a0bdf5eec16e0cb84842166dbd242d20e0a  libcrypt-camellia-perl_2.02-1_all.deb
  408. e137d9b335facb9aeaa7c77b424f8414c970a01e406d4a14b3b81c1b2b267344  libcrypt-camellia-perl_2.02-1_amd64.deb
  409. e3df84cfa22eb4d980317faf1e03cd567c0cdc80e1209ab7809418d1f74a980f  libcrypt-camellia-pp-perl_0.02-1_all.deb
  410. 74cf6b69cbd379566168e5ae605317e7c935d04023fe9fae52ae0fd01cb1a9c8  libcrypt-cbc-perl_2.33-1_Lulzsec-mod_all.deb
  411.  
  412. 3c35aa070086abacf429fabb75c696b963c8904475502ddc25f9828d8992f2c1  camellia.c
  413. 0d4acde103ad556aac4ec502358113ec7fdefc543266e68bf748a6048231ceaa  camellia.h
  414.  
  415.  
  416.    
  417.       LICENSE
  418.       -------
  419.    
  420.      ##############################################
  421.      ##             LulzSec License              ##
  422.      ##                                          ##
  423.      ## Do whatever you fucking want with this,  ##
  424.      ## but you must produce at least one act of ##
  425.      ## civil disobedience against the System    ##
  426.      ## and its rules, even if that represents   ##
  427.      ## not honoring this license at all.        ##
  428.      ## Fuck Cops' daughters, send cigarettes    ##
  429.      ## to those of us who are jailed, smash     ##
  430.      ## down CCTV cameras and...                 ##
  431.      ## also cocks, because lulz.                ##
  432.      ##                                          ##
  433.      ##############################################
  434.  
  435.  
  436.  
  437.    the fucking idiots @ FBI were trying to take our bittie$
  438.    so pl0x show some love
  439.    and drop some pennies to this one:
  440.        
  441.    1KrvDzgWrzJeWjzEDPnxziUJbrPNKpS3bs
  442.        
  443.    ^ bitcoin
  444.        
  445.        
  446.        
  447.    Remember always the biggest danger we faced came from the human
  448.    side (aka Sabu, other lame informants & other kind of feds'bitches)
  449.    not from the tech side and if it happened, it came from mistakes
  450.    made by ourselves or from the h4k0rz' usual drama & mutual pwnage.
  451.    FBI can't find even when their wives are cheating on them.
  452.    So be careful about who you trust to and what you are doing and
  453.    how you are doing it, always. stay safe <3
  454.    and code your freedom.
  455.        
  456.        
  457.    < theo> & use condoms for buttraeping!
  458.  
  459.        
  460.    dont forget to go to this CCC conf, even if many of us cant because feds lurking.
  461.     feds suck, d'you know?     
  462.        
  463.    if u have read all this PR without having brainzcancer
  464.    at least because grammar
  465.    u have our respect
  466.  
  467.    we wont give more details about this till Adrien Chen appears
  468.    on the front page of Hustler, disguised as a baby on pink clothes
  469.    with a buttplug on his mouth and...
  470.    ok, we're joking...
  471.  
  472.  
  473.  
  474. "Now I know what a ghost is. Unfinished business, that's what."
  475. ― Salman Rushdie, The Satanic Verses
  476.  
  477.  
  478.                ``;`                              
  479.              `,+@@@+                              
  480.            .+@@@@@@@;                            
  481.         `;@@@@@@@@@@@                            
  482.        +@@@@@@@@@@@@@:                            
  483.      ;@@@@@@@@@@@@@@@@                            
  484.    `@@@@@@@@@@@@@@@@@@`                          
  485.    `@@@@@@@@@@@@@@@@@@#                          
  486.     .@@@@@@@@@@@@@@@@@@,                          
  487.      :@@@@@@@@@@@@@@@@@@      .'@@                
  488.       #@@@@@@@@@@@@@@@@+;  .+@@@@@                
  489.       `@@@@@@@@@@@@@#;;+@+#@@@#:`                
  490.        #@@@@@@@@@@';'@@@@@@@:`                    
  491.        `@@@@@@@+;;+@@@@@##`                      
  492.         .@@@#;;+@@@@@#+',.,'.                    
  493.          +;;'#@@@@#+;`      ,:                    
  494.          .#@@@@#++:  @.    ...`                  
  495.       `'@@@@#++'. +  .#++;;+  +                  
  496.     ,@@@@@#++:``::+   `',:+,. ,                  
  497.   `@@@@#, #+` ',.`'.   +` ``  `,  .+              
  498.    @@:`  ,+. ,`:``.:   '. .',+++   #              
  499.    ``    #+`++,.`:,``    :`+@@'@@@@'    ````      
  500.          #'`#+:`.,`:` .@@@+@#  +`.      :  `:    
  501.          #:: +.`,.., `@@,#@':. +        :   '    
  502.          #: ` ',:`,, @#``    + +        ' `,;    
  503.          #: ` `:''`  @` #:.. , '        #+++:    
  504.          #: ,     ;#'#  + :   `:         #++      
  505.          #; '     `''         ,          '.      
  506.          ;' '                 #         `@#      
  507.           #.;                ;`       ,#.:;      
  508.           `+;               '.        @   `      
  509.            :#;            `@:        :`  `,      
  510.             .#+;        `'+.'        +            
  511.               .@++#'+@+@++` ;@.     '            
  512.                `' ., ` #:`# `+.#+  :.            
  513.                 ., :  @#;.`;`:  `#@.              
  514.                  +``,.;`@+,. '#                  
  515.                  @' ' ;`@:+`#`;`                  
  516.                 `#+  ,'`#  :.  '                  
  517.                 ' #.  :`#` '`. +                  
  518.                 # +.  .:+: :`. .                  
  519.                `, +,   ..+ '`   :                
  520.                ;` #+@:,:#.;``   '                
  521.                #'##:#+.  : `;   ;                
  522.                #. #:      `'`   :                
  523.                   #,        `   .        
  524.        2013. All Your Base Are Belong To Us.

No comments:

Post a Comment