How to Buy アスガル騎士団’s “ROBF”

・What is it?
ROBF is an Ero Doujin battle game created by アスガル騎士団 (Asgar Kishidan).

・Where can I buy it?
On DMM (Membership Required).
on DLSite (No Membership Required).

The creator of ROBF is working to make his games available on more English platforms. He’s also looking to set up a Bitcoin tip jar for those who prefer cryptocurrency. This information will be added when available.

・I already downloaded this for free. Why the hell should I pay this guy?
The Long Version:

TL;DR: Recently, copies of ROBF started getting passed around on 8chan, causing the creator to go on a fruitless DMCA takedown spree. Attitudes towards software and the internet being very different between Japan and the West (for various reasons) this lead to misunderstanding, and hostility.

After we reached out and explained the benefits of treating foreign users as potential customers instead of pirates, he agreed to take steps to make his work easier to access for overseas fans. If the positive steps made by Asgar Kishidan are met with increased sales, it would set a positive precedent that would encourage more Doujin artists to open up to their overseas fandoms. Also, if you enjoyed the game, wouldn’t you rather he felt motivated to make more, and to cater more towards you as an audience?

・The DLSite download page is all in Japanese, how the fuck am I supposed to figure this shit out?
The creator of ROBF is working on registering his game with DLSite’s English portal. In the meantime, however, the Japanese sales page is the only one that works.

Follow this step-by-step guide:

1: Go to the DLSite link and click on カートに入れる (Add to Cart)

2: Click on the Cart Icon on the top.

3: Click on クレジットカード (Credit Card). Other payment options such as Conbini Pay and Webmoney are Japan-only.

4: Enter an e-mail address (and again to confirm). Temporary e-mail services like GuerillaMail should work fine. This was successfully tested with GuerillaMail. Then click on 取扱いに同意して確認ページへ (Agree and go to confirmation page).

5: Click on テストメール通信 (transmit test mail) to confirm your e-mail address, and check your inbox to make sure it worked.

6: You should see テストメール通信完了しました (test mail transmission complete). Now click 外部決済へ (to external payment).

7: You will be redirected to an external payment portal ( Online prepaid credit cards should work, as well as regular credit cards. This has been tested with a Japanese VPreca prepaid credit card.

Enter your card number, expiry date, cardholder name, and CVV, then click 次へ (next).

8: Confirm the information and click 注文確定 (settle order).

9: You’re done. If you feel so inclined, click ダウンロード to download the official Japanese version.

Thanks for supporting improved relations between Japanese Doujin creators and overseas fans.


Hello People of Japan.

We are Anonymous.

In March 2018, Chief Cabinet Secretary Yoshihide Suga announced that, to combat the rise in manga piracy, the government was “considering all measures including site blocking”.

In early April, the Japanese government announced, in spite of the clear violation of Article 21 of the Japanese Constitution, that it would seek the cooperation of Japanese ISPs to block suspected pirate sites,

The government’s justification for this is to regard content piracy as a “present danger” under Article 37 of the Penal Code, which states “An act unavoidably performed to avert a present danger to the life, body, liberty or property of oneself or any other person is not punishable”.

Indeed, we can recognize a “present danger” here, but not in the form of manga piracy.

Government censorship, violation of Constitutional law, breach of communications privacy…these “present dangers” are right before us.

We do not speak in favor of piracy sites, nor do we defend them. That is not the reason we are speaking out on this issue.

But justifying government-ordered site blocking under Article 37 of the Penal Code is not only ludicrous, it’s also dangerous.

No matter what impact pirate sites may or may not have on the manga industry, the loss of profits can never be a considered a “present danger” in any way. Widening the definition of Penal Code Article 37 to such a ridiculous degree only invites further abuse, as other information and activities can easily be judged as more harmful than mere copyright infringement, and worth blocking.

The use of Penal Code Article 37 that allowed the blocking of child pornography sites raised concerns about a slippery slope of widening censorship. We were told that this was only a limited exception to Article 21, and there was no need for such fears. And yet now we are witnessing the slippery slope in action.

Even without a binding law, requests for voluntary cooperation to ISPs by the police or government are a form of pressure. The position of power government holds effectively coerces cooperation, making any such requests de-facto demands.

Further, asking ISPs to block access to certain sites encourages them to track the browsing habits of Japanese internet users more generally, which violates privacy of communications and expands the surveillance state.

We strongly condemn any site blocking requests from the government, and urge Japanese ISPs to refuse these requests and defend users’ Article 21 rights to privacy, and against censorship. These are actions we would expect from authoritarian countries like China and North Korea, not a Constitutional Democracy like Japan.

However, merely asking the government and ISPs to stop is not enough. It is necessary for Japanese users to secure their own privacy and freedom from censorship. To make this possible, we strongly recommend the use of Tor or a VPN. We will escalate our work to provide Tor and other VPN software in Japanese, as well as information on how to use this software to bypass site blocking.

We urge all Japanese internet users to begin using Tor and VPNs now. The more people can easily bypass site blocking, the more ineffective government censorship becomes. And as for the politicians who desire to violate their own Constitution in the name of censorship powers….

Please learn how to feel shame.

We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect Us.

アノニマスの見解 Ep.10: フィッシング・バカ日記

Hello again, Internet. And welcome back to ANONYMOUS NO KENKAI.

Almost exactly one year ago, in March of 2017, we talked about surveillance and the cost of enforcement in Episode 3. At the time, the Japanese government was steamrolling through the Conspiracy Law and giving the Police worrying new powers to spy on the population.

Since then, we’ve heard very little about the Conspiracy Law, or government surveillance in Japan. But no news is not necessarily good news. Covert surveillance being what it is, we often only hear about it when it’s already too late, and rarely through mainstream channels. In fact, there’s reason to believe that the Japanese government is actively involved in monitoring its citizens right now. But as usual, to understand how, we need to look at some other news.

In October of 2017, Kaspersky Labs discovered a new breed of Android malware, which it named “SkyGoFree”. When news about SkyGoFree started appearing in early 2018, it was obvious this was a cut above your common Android trojan. Rather than serving up spam or installing crypto miners, SkyGoFree gave the attacker full control of the device. It could track location, record audio and keystrokes, and exfiltrate all data, including from the clipboard. It even had the ability to use “geofencing”; If GPS data showed the device was inside a target location, the microphone could automatically start recording and send the data to a remote server.

SkyGoFree also had custom payloads that targeted specific Social Media applications, including Facebook, WhatsApp, Viber, and (of particular interest to Japanese users) LINE. It could also secretly connect to malicious wifi hotspots, even if the user had wifi deactivated, making it easier to monitor targets.

Fortunately, SkyGoFree can’t very easily install itself on a target device. The usual method for infection is to direct a target to a fake website that imitates their mobile carrier, then trick them into downloading and installing an infected APK. SkyGoFree victims were almost exclusively found in Italy, so this isn’t a worldwide phenomenon. But the capabilities of this malware suggested it wasn’t some low level criminal operation. SkyGoFree was very likely developed as a Lawful Intercept tool for government and corporate use.

Who made SkyGoFree? That remains unknown, but Kasperky’s analysis of the source code found two things. First, comments were written in Italian. Second, certificates and control servers repeatedly used the word “negg”. Most media outlets talking about SkyGoFree have been careful to avoid making any accusations…it’s good way to get in legal trouble, so that’s understandable. But the fact is, there is an Italian IT company called “Negg International”, which offers cyber-security and mobile app services.
誰がSkyGoFreeを作ったかまだ不明です。でもカスペルスキーによるソースコードの分析に基づいた2つの手掛かりがあります。まず第一に、ソースコードのコメントはイタリア語で書かれました。第二に、「negg」という名前は認証と指令管制サーバーで用いられます。法的責任を恐れ、ほとんどのニュースサイトは非常に用心してSkyGoFreeについて報告していましたが、実は「Negg International」というイタリアのITセキュリティーとモバイルアプリ企業が存在します。

Attribution in cyber-security is notoriously difficult, and while the evidence pointing at Negg is compelling, it could just as easily be a red herring to throw off investigation. However, Italy is no stranger to spyware manufacturers. The now-infamous “Hacking Team” was an Italian company, after all. And after their fall from grace, it’s hardly impossible to imagine others would try to fill the gap.
サイバーセキュリティの世界にあって、責任帰属は非常に難しい問題です。Negg Internationalを示す証拠は有力ですが、真犯人は発覚を避けるための煙幕を作ったという可能性もあります。しかしそうは言っても、イタリアはマルウェア開発企業になじみがあります。評判の悪い「Hacking Team」はイタリアの企業でした。Hacking Teamが信用を失墜した後で、他の企業が市場の隙間を埋めると思ってもおかしくはないでしょう。

Now on to our second story. In March of 2018, The Citizen Lab reported that Egyptian and Turkish ISPs were redirecting non-HTTPS traffic to phishing sites that infected them with FinFisher brand government spyware, as well as cryptomining malware. This redirection was made possible by a piece of equipment called a “middlebox”, which transforms, inspects, filters, or otherwise manipulates traffic that passes through it.
次の話に進みましょう。2018年3月に、Citizen Labという人権団体の報告によると、エジプトとトルコのプロバイダーはユーザの暗号化されていないウェブトラフィックを偽サイトまでリダイレクトし、FinFisherという政府向けスパイウェアまたは仮想通貨マイニングマルウェアを感染させたという新事実が明らかにされました。これは「ミドルボックス」というネットワーク装置によって可能となりました。プロバイダーはミドルボックスを使って通信を傍受し、リクエストに応じて変更を加えることができます。

The middleboxes in question were PacketLogic brand devices, manufactured by a Canadian company, Sandvine (which was merged with an American company, Procera Networks, in 2017). Among other things, PacketLogic middleboxes are capable of something called “deep packet inspection” or “DPI”. This lets them study the contents of user web traffic, and change, redirect, or block it as desired.
問題になっているミドルボックスは「PacketLogic」というブランド名の装置でした。メーカーは「Sandvine」というカナダの企業です(そして2017年にProcera Networksというアメリカの企業と合併されました)。他にも多数の機能がありますが、Packet Logicのミドルボックスにはディープ・パケット・インスペクション(DPI)の機能があります。DPIを利用すれば、プロバイダーが通信の内容を傍受、変更、リダイレクトが可能で、思うがままにブロックすることができます。

Using Sandvine equipment, ISPs in Turkey and Egypt would detect unencrypted web traffic and redirect it to phishing sites, most likely at the request of the government, who could use spyware infected phones to spy on their citizens, and use cryptominers to fund their own black budgets.

So why is this important? What do Italian Android spyware and Turkish ISP middleboxes have to do with surveillance in Japan?

First of all, it’s already known that the Bureau of Public Security was in the market for Italian spyware in 2014. At the time they were buying Hacking Team’s “GALILEO” software, but it’s unknown whether they actually purchased it, or whether they used any other suppliers.
先ずは、2014年に日本の警視庁公安部がイタリアのスパイウェアの購入を希望していたことは既に知られています。あの時に彼らはHacking TeamのGALILEOスパイウェアを買おうとしましたが、結局Hacking Teamまたは他の供給者のスパイウェアを買ったかどうかは知られていません。

Regardless, the fact that they want spyware makes it safe to assume they intend to use it, and that they’ll seek to keep their spyware arsenal up to date. It is well within the mandate of Public Security to monitor anti-war, anti-globalism, and other social movements. The Conspiracy Law only makes it easier for them to do so.

Secondly, the same PacketLogic devices used in Turkey and Egypt also exist in Japan. In July 2015, Procera announced that Softbank would use PacketLogic middleboxes for their LTE network. It’s unknown whether these devices are deployed on other telecom carrier networks, but it’s likely they have similar equipment.
次は、エジプトやトルコに利用されたPacket Logicミドルボックスは日本にも利用されています。2015年7月に、Procera Networksは、ソフトバンクがPacket LogicをLTEネットワークに使用すると発表しました。他のテレコム会社が使うかどうかは知られていませんが、類似の装置は利用されている可能性は少なくないでしょう。

So, to recap: Public Security is responsible for monitoring social movements. Public Security almost certainly uses spyware. At least one Japanese telecom giant uses equipment that can infect smartphone users with spyware. And the Conspiracy Law makes it legal to use spyware on civic groups. Is the Japanese government actually doing this? Maybe. But doo they have the ability to do it? Absolutely.

We said this one year ago, but it bears repeating: if you are part of any social movement in Japan, you cannot afford to assume you are not a target. Even one lapse of judgement with your smartphone can turn you into a walking wiretap. Cyber-security is everyone’s problem, and it only takes one person to compromise the security of an entire group. So if you don’t want to be the weakest link, here’s some advice for you to follow:

Always check the URL of a site you visit, especially if you need to enter passwords or other sensitive data. Phishing sites often use similar-looking URLs, so if you feel something is suspicious, check carefully. Also, make sure the site is using HTTPS. You can usually see a green lock icon next to the URL. If a site that looks like your mobile provider or internet company is pressuring you into downloading an “update” or “virus cleaner”, consider that it might be a trick and do some research first.

If possible, use different devices for your activism and your daily life. If you have a smartphone you use for casual web surfing and social media, do not use it to communicate with your activist group. You’re more likely to visit infected sites or click on links during personal web surfing, so using the same device for both increases your risk considerably. It’s easy to go to a used electronics shop and buy a seperate laptop, phone, or tablet cash and carry. For bonus points, install a non-commercial OS like Qubes, Copperhead, or at least Lineage.

Don’t use the same accounts either. Even if you have to use the same device, using personal e-mail or social media accounts for activism is dangerous for the same reasons. Ideally, you should be using non-commercial open-source services hosted outside the country for things like e-mail and cloud storage.

Using a pocket wifi device is better than using an internal SIM card, or public wifi. Personal pocket wifi gives you more control over when your device is connected or not, as well as how many people are using the connection.

Use Tor or a out-of-country VPN for all online activism. When connecting your devices to the internet, you need to remember that your ISP is probably helping to spy on you. An encrypted tunnel to an out-of-state VPN makes it harder to monitor or tamper with your traffic.

Don’t use Apple products for activism. iCloud may be safe against most criminal hacking attempts (usually), but Apple has been happy to cooperate with government spying requests in China and elsewhere. iPads and iPhones are also harder to modify and change OS on. Android is far from perfect, but at least it gives you more options.

Similarly, don’t use big name social media for activism. Find and use an open source platform that does not rely on the central control of a commercial entity. Like Apple, Facebook, Twitter, and LINE will share your information with the police if ordered to.

Encrypt. Everything. Always. Never ask yourself if it’s necessary. It’s always necessary. It costs you nothing but time, and a little effort in the short term can save you a lot of trouble later on.

And finally, encourage all your members to share the same security practices. You can have the best security in your group, but if everybody else is infected with spyware, it doesn’t matter.

As the world spins deeper and deeper into dystopia, cyber self-defense becomes more and more a crucial life skill. If you get lazy about your security now, you might find it’s far too late when you come to regret it.

This was ANONYMOUS NO KENKAI, and until next time… MACHIUKENASAI.

アノニマスの見解 Ep.9: 「私の安全に対して誰が責任を持っているのか?」

Hello internet. And happy birthday to ANONYMOUS NO KENKAI, which is now one year old.

Sadly the series has lagged behind “once a month” like I had originally planned, but I’d rather focus on quality over quantity, so every two months might be more realistic. My apologies.

We spent a lot of time over 2017 talking about the Why and How of personal privacy and anti-surveillance. We talked about the dangers of the filter bubble and the skinner box, we talked about the dangers of government surveillance power, and we also talked about the tools you can use to protect yourself from both. But there is one more issue that needs addressing. What if these anonymity and privacy tools are abused?

As much as some try to paint the question as concern trolling, it is a valid one and it needs to be addressed. Encryption tools like Tor and PGP are free and available to all, which means they’re available to criminal groups as well. Crimes can be planned in encrypted chat. Harassment and abuse can hide behind Tor or a VPN. Private information can be anonymously leaked to the internet. The so-called Dark Web is home to a lot of morally questionable, even outright criminal onion sites.

To be clear, these are all terrible things. And they need to be opposed, and victims protected. But every time a bad actor earns the spotlight by doing these things, people point to their abuse and claim this is the reason why privacy tools should be kept out of common hands. But is this really fair?

It would be cliche to talk about how any tool can be abused; knives can cook dinner or slit throats, trucks can delivery goods or ram into crowds, etc. It would also be cliche to talk about how everybody has curtains on their windows and locks on their doors. These arguments, while valid, don’t really get to the heart of the matter. To understand this issue, the question we need to ask ourselves is, “Who is responsible for my safety?”

Safety is important, of course. It ranks second in Maslow’s hierarchy after physiological needs. But not everybody will see eye to eye on best way to maintain it, especially on the societal level. In our modern world, the standard is to entrust the government and police with our safety. And to a certain degree, that works. But it comes with a price.

When you outsource your security, you’re taking power out of your own hands and giving it to someone else. This opens you up to considerable risk. Sure, the police can protect you from criminals. Maybe. But if the police become corrupt, who’s going to protect you from them? If you give up the ability to defend yourself, or make self-defense illegal in the name of “public safety”, all you’re doing is exposing yourself to more danger in the long run. There are more than a few countries who put all of their trust in the State and ended up regretting it. Power does corrupt, after all. Even if you like and trust the police now, things can easily change in the future.

Ask yourself this: which would you prefer, having multiple weaker enemies and the ability to defend yourself, or being completely helpless against one powerful enemy?

Chinese people gave their government total control of the internet. Now the Communist Party of China monitors every citizen, and controls every word. North Korea is even worse. The Americans gave in to fear, and now look at the surveillance police state they live in.

Modern Japan is largely a safe country. The police do their job reasonably well… though when they make mistakes or go too far, the consequences can still be terrible. But in the online world, things are a bit different. As we’ve already talked about before, police and governments around the world seem to think that a Total Surveillance Panopticon is a good solution to policing the Internet. We, of course, disagree.

We feel that individuals on the Net are best served by having access to the tools and the knowledge to defend themselves. Yes, bad actors will take and use these tools too. But there are bad actors everywhere in life, and the only way to be completely safe at all times is to live in prison. The police will still investigate and arrest criminals, as they should, but everybody should also have the right…and the responsibility…to learn the basics of online security, and make their own choices about what risks they want to take. Anyone who tries to take that right away from you could potentially end up a bigger threat than any criminal.

And as for these bad actors themselves, the ones using privacy and anonymity tools for harmful ends, there’s really only one thing to say to them…

This was ANONYMOUS NO KENKAI. And until next time…MACHIUKENASAI.

分散的動画サイト「SPKOUT」 :日本語のユーザーガイド



Hey everyone. It’sa Me!

This is just a couple of quick announcements:

First, we have a Circle at Winter Comiket this year. As usual, this circle is focusing on “Chanology”, our anti-Scientology project. We’ll be distributing all four volumes of our “Disconnect” comic series.

If you don’t already know, “Disconnect” is a fictional comic series based on true stories, largely, following the adventures of best friends Sara and Angela as they get caught up in the dangerous cult of Scientology.

Disconnect will be the main focus of the circle, but we might have some other material too, so feel free to come down and visit us! We’ll be in East Hall, Booth ツ53a, on Day 3 (that’s December 31st).

If you can’t make it, no worries. All of our comics and literature are available as free PDF downloads from our website. You don’t even need to visit us at all, but please do! I need to pretend I have friends for an afternoon.

In channel news, our YouTube channel has almost reached 500 subscriptions. If we actually manage to push over the 500 mark, I’ll be making some kind of subscriber special to celebrate. I’d like to thank everybody who’s subbed and enjoys our content, and please let us know in the comments what you like and want to see more of.

Unfortunately, there is some small bad news., the alternative video hosting platform, has shut down as of December 15th, so our channel there is gone of course. Fortunately, BitChute is still up, and copies of all our videos will be hosted on our channel there.

In fact, BitChute has started automatically copying all our YouTube uploads, making it even more convenient and easier to use. So much so that we’d like to promote and recommend BitChute to Japanese users.

Unfortunately, localization into Japanese isn’t on the schedule for BitChute’s creators yet, so we’re planning to put together a Japanese How-To guide to fill the gap until then. Work on that will probably start next year after Comiket is over, so look forward to that in the future.

And of course, ANONYMOUS NO KENKAI will continue just as soon as I think of a good topic for the next video. As always, leave a comment if you have a request and I might go with it if I like it.

Thanks again for watching, hope to see you at Comiket, and have a Happy New Year.

アノニマスの見解 Ep.8: 快楽の牢獄

Hello internet,

In our last video we talked about decentralization, alongside anonymity and encryption, the three pieces of the Triforce of Internet Freedom. We’ve used several videos, in fact, to talk about how you can protect yourself online. But I think it’s time we spent a little more time talking about exactly why you should be protecting yourself, and what from.

The obvious answer is government surveillance, which certainly is a threat to your freedom. Political freedoms can’t exist when every action and every word is watched by government spies. But surveillance is only the most obvious threat, and the one most people at least try to avoid. The bigger threat is one that almost nobody recognizes, even as they actively seek it out and enjoy it. What you should be protecting yourself against isn’t just what you fear. It’s what you love.

With that said, let’s step back and introduce a few ideas we need to understand, starting with the concept of the “Filter Bubble”.

The Filter Bubble is a term coined by internet activist Eli Pariser around 2010, describing a phenomenon of online isolation caused by personalized search algorithms. These algorithms gather data like user location, past click-behavior, and search history, and then feeds back information it thinks users would like based on their past behavior. Over time, the algorithm filters out information it thinks the user won’t like and promotes what it thinks they will. Soon the user is surrounded only by information they agree with, while information they disagree with simply disappears.
「フィルターバブル 」はインターネット活動家であるイーライ・パリサーが2010年ごろに作った新語です。フィルターバブルとは、インターネット検索サイトやSNSのパーソナライズされたアルゴリズムによって生じるユーザー孤立化の現象です。そういうアルゴリズムが、ユーザーの情報(所在地、過去のクリック履歴、検索履歴など)に基づいてユーザーが見たい情報だろうと推定した検索結果を出す。時間と共に、ユーザーは嗜好に合わない情報から隔離され、実質的に彼ら自身の文化的、思想的な皮膜(バブル)の中に孤立するようになっていく。ついに、ユーザーに見える情報はすべて観点に合うものだけです。観点に合わない情報が消えます。

It’s important to remember that the user never sees this system. Usually they don’t even know it exists. From their perspective, their timeline and search results are simply always things they want or agree with. When this information is funny cat videos or food photos, it may not seem like such a big deal. But increasingly, social media platforms like Facebook, Twitter, and YouTube are becoming places where people engage with politics and get their news. And when black box algorithms are deciding for you what news and political opinions you should see, the threat of information control and manipulation becomes much more serious.

Beyond the Filter Bubble, there’s one more idea we need to understand; the Skinner Box. The idea of the Skinner Box comes from the work of American psychologist B.F. Skinner in the 1930s. Although I won’t go into his work in detail here, I recommend reading up on both him and his work on “Operant Conditioning” if you have the time. It’s interesting stuff.

The Skinner Box is a literal box used by psychologists to experiment on animal behavior. The box usually has a lever for the animal to push, and a food dispenser to feed the animal as a reward for correct behavior. For more details on how this works, let’s turn to とらますく先生:

One of the most important lessons learned from the Skinner Box is that simply rewarding a behavior every time it’s performed isn’t an efficient way to reproduce it. Instead, rewarding behavior after a random time period has much better results, as Skinner himself pointed out:

Skinner: The main thing is what we call “schedules of reinforcement”, what the layman calls “reward”, and you can schedule it so that a reward occurs every now and them when a pigeon does something. We usually use a response where the pigeon pecks a disc on the wall, and you can reinforce with food. But you don’t reinforce every time, you do it every tenth time, or once per minute, or something like that … and there is a good example of how you can move from the pigeon to the human case, because one of the schedules that’s very effective is what we call the “variable ratio schedule” and that is at the heart of all gambling devices and has the same effect.”

Skinner’s example of gambling is appropriate, because unfortunately the Skinner Box technique has been applied heavily in the areas of video games and social media. Gacha-style mobile games are the perfect example of this in Japan, but even overseas, more and more AAA gaming companies are putting in “loot boxes”, which employ the same technique of anticipation and random rewards.

But it isn’t just video games. Accoring to author Adam Alter, Facebook, Twitter, and more use exactly the same techniques to keep users addicted to their platforms. Refreshing your timeline to check for Likes or Comments is mechanically the same as gambling, or playing a Gacha game. You do an action and get a variable reward, the reward in this case being social attention. And it all keeps your attention on the app, where the advertisements are.

This loop of Action, Anticipation, Variable Reward is the essence of the Skinner Box, and this exploitation of human psychology is what keeps you coming back long after the action itself has lost its novelty.

So why is all this important? What does social media advertising or pay-to-win games have to do with surveillance and privacy? Well, the Filter Bubble and the Skinner Box are creepy and manipulative enough on their own. But their real danger lies not in how they’re used, but how they can be abused.

The Filter Bubble is designed to study your behavior and give you what it thinks you want. But the algorithm behind this is a black box controlled by the company. With a few minor changes, it can just as easily be programmed to give you what somebody else wants you to see. You can be isolated from all opinions except those held by those in control of the algorithm.

Once your environment is controlled, the Skinner Box takes over. The system encourages you to say, think, and do the right things, and rewards you when you do. The more you’re rewarded, the more you repeat the action. From here, the Filter Bubble and the Skinner Box form a perfect loop. You’re shown content that is designed to make you react, and provide the system with more information about what makes you react. The system learns more about how to control you with every click you make. Nowhere are you provided a choice in what you see. This can be used to make you buy anything, from instant ramen to political parties.

And the worst part about it is that you never think you’re being controlled. You think you’re making your own choices, but the options given to you and the information about them can be carefully controlled to guide you to the decision somebody else wants you to make.

If you doubt that governments and intelligence agencies are eyeing these technologies, you need look no further than the example of Pokemon GO. Niantic, the company behind Pokemon GO, shares staff and technology with a company called “Keyhole”, which in turn received funding from In-Q-Tel, a CIA-run venture capital firm.
政府と諜報機関がこの技術には興味あるとは思えないなら、ポケモンGOを見てみればいい。ポケモンGOアプリを作った会社「ナイアンティック」は他の会社、「Keyhole Inc.」、からスタッフや技術を獲得しました。そしてKeyholeは米CIAに設立された「In-Q-Tel」というベンチャー投資会社から投資を受けました。

Even if we ignore these shady connections, what Pokemon GO can do is scary enough by itself. It’s already been proven that a rare Pokemon appearance in Central Park can draw hordes of people. And Niantic has worked together with several prefectural governments in Japan, including Fukushima, to make valuable Pokemon appear to draw in more tourists. Niantic has the power to push a button and change peoples’ decisions about whether or not they want to go somewhere. The game is now controlling the player. Stop and think about that.

This is what we need to defend ourselves against. This is why we should guard against what we love as much as what we fear. Decentralization counters the rise of the Filter Bubble. Anonymity prevents systems from connecting your actions to your identity. And Encryption interferes with the ability of the system to study the content of your conversations and activities. Together, the Triforce of Internet Freedom breaks the loop between Filter Bubble and Skinner Box, and helps put you back in control of yourself.

Am I telling you to quit social media? Or to stop playing Gacha or Loot Box games? Not exactly, though you can if you want, and I’d certainly encourage it. All I want you to do is be aware of these systems, and how others are trying to manipulate you. If you want to keep using them, you can choose to do so. As long as it was really you who made that choice.

This was ANONYMOUS NO KENKAI. And until next time…MACHI UKE NASAI.

プロジェクト Wild Release

[ このポストは「けものフレンズ」の「たつき監督の件」について。この件が知らない方は先ずこの記事を読んで下さい:

This post is related to the “Director Tatsuki” incident from the Kemono Friends anime. Those not familiar with the events should read this first: ]

以下の声明はTwitterユーザー @Ryo_koumei_m から。 我々はこの声明に賛成しますので、広範囲に広めるために英語に訳して、ここにポストしました。オリジナルはここに読めます:

The following statement is from Twitter user @Ryo_koumei_m. Because we agree with this statement, we have translated it into English and posted it here to help spread it as widely as possible. The original can be found here:

* * *

Last night I was outraged, but now that I’ve had a night to calm down, there are a some questions I’d like to make clear.

疑問点1 けものフレンズプロジェクトAは(株)ヤオヨロズによる作品の私物化があったと指摘しているがそれは具体的に何を指しているのか。
Question 1. “Kemono Friends Project A” pointed out that some of their work had been appropriated by Studio Yaoyorozu, but what specifically are they referring to?

疑問点2 (株)ヤオヨロズによるガイドライン違反があったのか。仮にあれば具体的に何を指すのか。
Question 2. Did Studio Yaoyorozu violate any guidelines? If so, what specific violations can you point to?

疑問点3 吉崎観音氏による「終わった後も自由に作っていいですよ」という発言。ここで言う“自由”の範疇。
Question 3. Regarding Mr. Mine Yoshizaki’s words, “After’s it’s finished, you’re free to keep making [Kemono Friends]”. What manner of “freedom” did he grant?*
*(on Apr.4 2017, Concept Designer Mine Yoshizaki made a Twitter post referring to him giving Director Tatsuki permission to keep working on Kemono Friends material)
*(see and )

疑問点4 情報共有や連絡がないままでの作品利用というのが仮に「ばすてき」だった場合、何故KFPAは動画の公開を差し止めていないのか。
Question 4. If we assume the “use of work without information sharing or contact” is referring to “Basuteki” (Ep 12.1), why isn’t Kemono Friends Project A (KFPA) blocking the posting or promotion of the video?

疑問点5 情報共有の申し入れとは具体的にどのようなものであったか。それはいつの話なのか。
Question 5. What exactly was the “request for information sharing”? When was that in reference to?

疑問点6 それが情報共有のみの申し入れであったのか。
Question 6. Was that request only for information sharing?

疑問点7 (株)ヤオヨロズが「その条件では受けられない」と主張したとされる「その条件」とはどのような条件を指すのか。
Question 7. When it was claimed Studio Yaoyorozu said “we cannot accept under those conditions”, exactly what conditions did that refer to?

疑問点8 KFPAの「(ヤオヨロズによる)辞退」とたつき氏の「カドカワさん方面よりのお達し」という主張の食い違いが起きているのは何故か。
Question 8. Why is there such a discrepancy between KFPA’s claim of Studio Yaoyorozu “declining” and Director Tatsuki’s claim of “being ordered by Kadokawa”?*
*(with regards to Director Tatsuki and Studio Yaoyorozu no longer working on Kemono Friends Season 2)

Of coure I’ve always had a good feeling from the idea of “Animals First” put forward by the project. Put in the present situation, that report [from Kadokawa] appears more like a cover for the oppression of Studio Yaoyorozu, who were in charge of the animation production. I’d think “Animals First” would be impossible from people who would disdain the feelings of others.

It is simply a matter of fact that many people, including myself, don’t have the heart to cheer for the project, no matter how much we like it, under the bad atmosphere created by the management side of things. Humans are animals with a relatively good memory, after all.

今後の展開、様々な場面で今回の事を思わず想起してしまうのがヒトという生き物だろう。表面的には楽しくとも今までの様に心の底から楽しくなれるだろうか。「たーのしー」気持ちは作り手の情熱と、それを支える Pや企業による盤石の安心感の中にこそあったはずだ。
It’s only human for people to think back to this affair at various points in future developments of this project. It may be fun on the surface, but will it truly be fun from the bottom of our hearts? It feels as though the feeling of “tanoshii” came from the passion of the creators, built on a foundation of security that came from the support of the producers and the companies involved.

In order to resolve the questions listed above, I think we should ask those questions to the various stakeholders of the project.

Those who can send e-mails should send e-mails. Those who can phone in should phone in. Even letter mail or fax is okay. This should be our path to creating a better future. We’ve learned by now that by coming together as individuals, we can be stronger than despair. And we know who to thank for teaching us that.

Finally, I’d like to note the one negative outcome that I personally feel most concerned about. That’s the collapse of this miracle-like bond between Mine Yoshizaki, Director Tatsuki, Doubutsu Biscuits and PPP’s members, and all of us fans, created thanks to Kemono Friends.

I want to stop that at all costs. If you feel the same way that I do, then I hope you’ll join your strength together with mine.

KFPA 問い合わせ:
Kemono Friends Project A CONTACT LIST:

Famima Dot Com
Free Dial: 0120-172-890

TV Tokyo
Tel: 03-6632-7777

Age Global Networks



Cruchyroll (e-mail contact)

JVC Kenwood Victor Entertainment

Mail: 東京都目黒区目黒3-9-1、目黒須田ビル701
Tel: 03-5725-3444
Fax: 03-5725-3445

アノニマスの見解 Ep.7: 分散型、非集中系

Hello again everybody

It’s been a while since the last ANONYMOUS NO KENKAI, and I apologize for the delay. Comiket kept us busy, but that’s behind us now, so we’re back to business as usual. Thank you to everybody who came out to our booth to visit us and pick up a book. Disconnect Volume 4 is now available as a free PDF download on our site, in English and Japanese, so go check it out.
前の「アノニマスの見解」からずいぶん時間が立って申し訳ない。コミケで手いっぱいだったが、もう終わったからいつものパターンに戻ります。チャノロジーのサークルに来てくれたみなさん、ありがとうございます。Disconnect Vol.4のPDF版、英語版も日本語版も、私たちのサイトから無料ダウンロードできますので、ぜひ見て下さい。

So what’s the topic going to be this time? Well, today we’re going to talk about “decentralization” and what it means for a free internet. We’ve already talked about the value of anonymity and the necessity of encryption, but decentralization is another very important pillar of internet freedom. But why? And what exactly does it mean?

Perhaps the best way to describe decentralization is to describe what it isn’t. And to talk about that, we need to look at few news stories.

1) nemuismywife: Near the end of August, a Japanese Twitter user (@nemuismywife) had his account suspended after he posted a “death threat” against a mosquito in his living room. As of the posting of this video, the account has not been restored and Twitter Japan has made no comment, in spite of the story being picked up by both the BBC and Yahoo News.
1) nemuismywife: 8月末に、「nemuismywife」という日本人のツイッターユーザーが冗談で「蚊へ死の脅迫」を投稿しました。すると、すぐに、アカウントは凍結されました。いまだに、彼のアカウントは凍結されたままです。このことは、BBCとヤフーニュースに取り上げられてるにもかかわらず、Twitterから声明が全くない。

2) Haruka Yume no Ato: In early September, it was announced that the pirate manga link index site “Haruka Yume no Ato” was shut down after a coordinated police raid in 8 prefectures. The owners and operators of the site are being investigated for violation of the Copyright Law, in spite of the fact their site hosts no content itself. Haruka Yume no Ato creates lists of links to sites outside Japan where pirate manga can be found, but apparently just hosting links to other peoples’ content is enough to get the police involved these days.
2) はるか夢の址: 9月初めに、海賊版マンガのリンク情報収集サイト「はるか夢の址」は警察に急襲され、閉鎖されました。サイトの内容には海賊版マンガが全くないにもかかわらず、所有者はダウンロード法違反の疑いで取り調べられてる。「はるか夢の址」は国外の海賊版マンガダウンロードリンクのリストを作るだけですが、それだけでも警察の目を引くのに十分ですね。

3) YouTube’s Sandbox: In the wake of America’s recent moral panic over Nazis, YouTube (owned by Google) created a system where selected users could flag “offensive” videos. These flagged videos would then have their comments and sharing features disabled, effectively isolating them without technically banning or censoring them.
3) YouTubeのサンドボックス: アメリカでの「ナチス復活」という茶番を受けて、YouTube(親会社Google社)は特定ユーザーがビデオに「不適切」というフラグを付けることができるシステムを作りました。フラグ付けてるビデオのコメントと共有機能は無効にされるので、厳密に言えば検閲されてないが、実際上は隔離されます。

Perhaps Google and their army of amateur volunteer moderators have nothing but good intentions. But mob justice isn’t known for being fair or accurate. Case in point, I present to you the video “Paint Colors in Reenacting”, a video by “Reenactor Guy”. The video is about how to paint props for World War 2 reenactment. In spite of it having nothing to do with neo-Nazis or racism, the video was flagged as “offensive” and isolated for several days.
Googleとそのボランティアモデレーターは善意にあふれているかもしれないが、暴徒による正義は公明正大とは言えない。例として、「Reenactor Guy」と名前のユーザーから「Paint Colors in Reenacting」のビデオを紹介したいと思います。WW2の戦闘を再現するために小道具の塗装する方法のビデオです。ネオナチまたはレイシズムと全く関係ないなのに、ビデオは「不適切」とフラグ付けられて、数日間隔離されてしまった。

It was eventually returned to normal, but only after Reenactor Guy appealed, and even then he was given no explanation or apology. But this isn’t Google’s first dance when it comes to content censorship.
後に元に戻されたが、Reenactor Guyが抗議した後だった。しかも、YouTubeから説明も謝罪もなかった。しかも、Google社の検閲はこれに始まったことではありません。

4) The Controversial Case of the Daily Stormer: Around the middle of August, a protest in Charlottesville, Virginia turned violent resulting in the death of one Heather Heyer. In the media storm that followed, a website called the Daily Stormer posted an article about the deceased that…upset some people.
4) 「Daily Stormer」の物議を醸す事件: 8月半ばに、アメリカのシャーロッツビル市の抗議デモが暴徒化して、Heather Heyerと名前の女性の死につながりました。マスコミの興奮のただ中で、「Daily Stormer」というサイトが死亡者に関する物議を醸す記事を載せました。

Now, the Daily Stormer is billed as a right wing neo-Nazi website. I’m not one to take labels at face value anymore, but having visited the Daily Stormer to investigate, I can say I’m not a fan of their content.
「Daily Stormer」は右派ネオナチサイトといわれます。私はレッテルを額面通りに受け取るのを好まない人ですが、Daily Stormerのコンテンツを直接経験して、嫌だと感じました。とにかく、特に好きというわけではない。

Neither, apparently, was their domain registrar. The Daily Stormer was given 24 hours to move or be delisted. They moved to Google’s domain management service, but just hours after they did, Google not only refused to serve them, but placed their domain on “client hold”. This meant that the Daily Stormer couldn’t activate or use their domain name, nor could they move it to another service. It’s been several weeks, and the Client Hold has not been released, with no sign that it will be.
ドメインネームの登録機関だってDaily Stormerを好まないみたい。Daily Stormerは、彼らに「24時間以内に他の登録機関に切り替えないとサイトをサービスから除く」と言われました。Daily StormerはGoogle社のドメイン管理サービスに変更したが、数時間後Googleはサービスを断っただけではなく、ドメインを凍結した。つまり、Daily Stormerはそのドメインを利用できず、そしてサービスを切り替えるもできなかった。それから数週間後、ドメインはまだ凍結してある、そしてGoogleが所有者に返還しようとしないみたい。

For many, this was great news. Neo-Nazi hate speech had been shut down on the internet. And that was a good thing…right?

Well, it’s a little more complicated than that. See, there are no apparent rules or limits on Google’s ability to use these “client holds”. If the Daily Stormer was breaking the law, it should have already been a police matter long before this. Does this mean Google just seized their domain because they didn’t like their content? Are there any limits to this power, or rules governing its use? If Google can do this to the Daily Stormer, who else can they do it to?
実は、事態はもう少し複雑です。まずはGoogle社がドメインを凍結する権力には規則や限界がありません。もしDaily Stormerが犯罪行為をしたら、警察はすでに関与するはず。つまり、GoogleはDaily Stormerのコンテンツを好まないというだけでドメインを凍結したということでしょうか?凍結権力には規則や限界は何ですか?GoogleはDaily Stormerにこんなことができるなら、他のサイトにも同じことできるのではないでしょうか?

5) China Bans Anonymous Posting: On Friday, August 25th, the Chinese government announced a new set of regulations that would force internet services to register all their users under their real names starting October 1st of this year. In justifying these regulations, the Cyberspace Administration of China cited a law from 2000 that specified what kind of content was forbidden on the Chinese internet, including “inciting hatred, spreading rumors, and insulting or slandering others”. Sounds familiar. The rules are broad and vague enough to cover nearly anything, which I’m sure is the point.
5) 中国での匿名禁止: 8月25日金曜日に中国政府は、ISPが今年の10月から実名でユーザーを登録する義務を負うという新しい法律を発表しました。この法律を正当化するのに、「中国サイバー管理部」は「ネット上の禁止事項」を指定する2000年からの法律を挙げました。禁止事項の中に、「ヘイトを引き起こすこと、デマを飛ばすこと、そして人を侮辱するまたは中傷すること」が入っています。聞き覚えがあるよね。もちろん、この法律は過度に広範そして曖昧だからこそ、全ての政府決定を正当化します。計画通りにね。

Now, it’s worth noting, the Chinese government has been attempting to ban anonymous speech and force real-name registration for years, with limited success. It’s also worth noting that the Daily Stormer is already back up, proving that internet censorship isn’t as easy as some would like. Yet.
注目されるのは中国政府は何年間もネット上の匿名性を禁じようとしてきたが、ほとんど成果がないことだ。さらにDaily Stormerもすでに戻ったことから、ネット検閲はそう簡単ではないと証明されます。今のところだけだが。

But it does point out the problem of centralization. Whether it’s corporations acting on their own, or following the orders of the State, internet services are vulnerable to control and censorship when they have a single, central point of failure. When one person, or a small group of people, have the power to control what you can or can’t see, that power will be abused. Maybe not today, but the mere fact that such power exists will eventually attract those who want to abuse it.

“But Anon, we need these powers to shut down Hate Speech and stop racists!”

Even if I agreed with that idea, there’s one problem with this. Any tools or laws that can be used to silence so-called “hate speech” can also be used to silence any other kind of speech. Once the power is created, there are no limits on how it can be used, or who it can be used against. History has shown us that Hate Speech Laws are often turned against their creators, and used to suppress criticism and free speech. Every time you support these laws, all you’re doing is tying a noose around your own neck.

So what’s the answer? Well, as I’ve said before, the best way to respond to an unjust law is to make it impossible to enforce. And the best way to respond to the threat of centralized services is to decentralize as much of the internet as possible.

Twitter, Facebook, YouTube, and other centralized services rely on a central hub to function. If that central hub is compromised or disabled, there goes the entire service. By contrast, a decentralized system has no hub. Instead, it’s made of many individual nodes that can freely and voluntarily connect to each other. Even if one or more nodes are compromised, the rest of the network can route around them. And data shared by one node can be spread to all other nodes, making it difficult if not impossible to censor.

In fact, there are several examples of decentralized or partially decentralized services that already exist. One of the most famous examples of this is BitTorrent and its various clients, which have enabled file sharing for over a decade now. Mastodon and GNU Social, while not completely decentralized, are still federated, and provide some measure against total censorship that users like nemuismywife might appreciate. Similarly, Matrix and XMPP are chat protocols that can be run by anybody, and interoperate with other instances of the same software.

Many YouTubers are fleeing to alternative platforms, and one that’s caught my attention is BitChute. Instead of central servers like YouTube, BitChute uses WebTorrent, a browser-based torrent client that allows users to peer, seed, and share the content they watch straight from the browser. BitChute is still in its early stages, and not everything seems to be working quite as advertised yet, but it’s a promising start.

Finally, the most interesting. Of course everybody knows 2ch, Futaba, 4chan, and 8chan. Imageboards have been around for years, and while they were once seen as bastions of unfettered free speech, lately that illusion is starting to fade. Everybody probably knows about Hiroyuki secretly datamining 2ch for years, and that he’s doing the same thing to 4chan after buying it. Even 8chan isn’t immune to this, if the “8leaks” posted to endchan are anything to go by. Once again, centralization provides a single point of failure. And once again, the solution is decentralization. Enter NNTPChan. An open source imageboard that repurposes the News Network Transfer Protocol to share posts across multiple nodes. While each individual node is hosted on its own server, any post made on NNTPChan is quickly duplicated on all other nodes, making it nearly impossible to censor. NNTPChan can be accessed via Tor, the Invisible Internet Project, I2P, and the regular clearnet, but all posts are shared between all nodes regardless of source.
そして一番いいものを最後の楽しみにとっておきました。みんなは2ちゃんねる、ふたば、4chan、または8chanを知ってると思う。掲示板は長い歴史を持つ、そして言論の自由の保護領域と見られた時があったが、最近そのイメージは消えてなくなる。ひろゆきが2chにデータ・マイニングをしたことはよく知られてる、そして4chanを買ってからそこで同じことをやり始めました。endchanに掲示された「8leaks」によれば、8chanもユーザーを監視するという衝動を抑えられないみたい。再び、集中型サービスには単一障害点を生じさせる。そして再びに、解決法は分散化である。皆さんに、NNTPChanを紹介したいと思います。ネットワーク ニュース トランスファー プロトコル(NNTP)を利用して提出されたデータを様々なノードの間に共有するオープンソースな掲示板です。個々のノードはそれ自身のサーバー上にありますが、全ての投稿は全ノードに重複されますので、投稿を検閲することは不可能に近い。Tor、不可視インターネットプロジェクト(I2P)、あるいは表層ウェブからアクセスできます、でも投稿の源泉にもかかわらずすべてのユーザーはお互いに読めます。

All of these recommendations are just a starting point, and I encourage all of you to start looking into decentralized, open-source alternatives to as many online services as you can. Facebook, Google, Microsoft, and all the other centralized corporate platforms may be powerful, but they’re only as powerful as we collectively allow them to be. You don’t have abandon everything immediately, but if you start diversifying now, you make it easier for yourself in the future.

I’m a big believer in practicing what I preach, which is my I’ve already moved the entire ANONYMOUS NO KENKAI series to two new video platforms: and Bitchute. I’ll continue to use YouTube for now, but I’ll also be uploading all videos to these platforms simultaneously. That way, the day Google goes too far and cracks down too hard, walking away from YouTube won’t be so difficult. When that day comes, I hope you’ll be joining me. But, as always, the choice is yours. Just remember…if you choose to keep the slave collar of big centralized services around your neck, don’t be surprised if it’s too late by the time you come to regret it.

This was ANONYMOUS NO KENKAI, and until next time…MACHIUKENASAI.




Due to preparations for Summer Comic Market, future “Anonymous no Kenkai” videos will be postponed until late August or early September.
Chanology Anonymous will be participating in this year’s Summer Comic Market, so please come down and visit us! We’ll be there Aug.13th (Day 3), East Hall イ37a.