After the blocking of LibGen in India, people are still downloading free book PDFs through several alternative methods and sites. The most common ways include using LibGen mirror and proxy sites, VPNs, and alternative ebook repositories.
Accessing LibGen via Mirrors and Proxies
Although LibGen's main domain may be blocked in India, several working mirrors exist such as libgen.is, libgen.li, and gen.lib.rus.ec. People often find new working domains by searching for "library genesis proxy" or "library genesis mirror." Some users recommend using a VPN to bypass ISP-level blocks and access the original or mirror domains safely.cashify+3
Alternative Free PDF Book Sites
Users have shifted to other websites that offer free book downloads:
Anna’s Archive (annas-archive.org), which aggregates resources from LibGen, Z-Library, and more.reddit
Z-Library, another major source of free e-books, although it sometimes faces its own restrictions.techpoint+1
PDF Drive, for a wide variety of textbook and general PDF downloads.reddit
Other options like Ocean of PDF, DigiLibraries, Project Gutenberg, and ManyBooks also serve as alternatives, though their collections may be more limited or focused on legally free (public domain) works.techpoint+1
Using VPNs and Tor Browsers
People in India frequently use free VPNs (like ProtonVPN or 1.1.1.1) to access blocked sites, including LibGen and its mirrors. Some users also recommend privacy-focused browsers like Tor to navigate around ISP restrictions.reddit+1
Key Points and Cautions
Visiting and downloading from these sites may redirect users through popups or advertisements. Using antivirus software is recommended.
The legality of downloading copyrighted materials without permission is questionable in many jurisdictions, even if local enforcement focuses on distribution rather than individual downloads.reddit
In summary, despite the ban, readers in India continue to access free book PDFs by adapting quickly to new mirrors, using VPNs, trying site alternatives, and utilizing aggregation sites.librarygenesis+5
This note is less about accessing Twitter API but more about Cyber Security where you run a curl command and based on the output from that command you try to figure out the firewall settings of the system.
System 1 Configuration With Strict Firewall Where Our Curl Command For Accessing Twitter API is Not Working:(base) C:\Users\ash\Desktop>systeminfo
OS Name: Microsoft Windows 10 Enterprise
OS Version: 10.0.19042 N/A Build 19042
Processor(s): 1 Processor(s) Installed.
[01]: AMD64 Family 23 Model 24 Stepping 1 AuthenticAMD ~2100 Mhz
BIOS Version: HP R79 Ver. 01.10.03, 3/24/2020
Network Card(s): 4 NIC(s) Installed.
[01]: Realtek RTL8822BE 802.11ac PCIe Adapter
Connection Name: Wi-Fi
DHCP Enabled: Yes
DHCP Server: 192.168.1.1
IP address(es)
[01]: 192.168.1.100
[02]: fe80::b1b2:6d59:f669:1b96
[03]: 2401:4900:47f1:b174:70f4:de28:6287:b1c9
[04]: 2401:4900:47f1:b174:b1b2:6d59:f669:1b96
[02]: Realtek PCIe GbE Family Controller
Connection Name: Ethernet
Status: Media disconnected
[03]: Bluetooth Device (Personal Area Network)
Connection Name: Bluetooth Network Connection
Status: Media disconnected
[04]: Check Point Virtual Network Adapter For Endpoint VPN Client
Connection Name: Ethernet 2
DHCP Enabled: Yes
DHCP Server: 10.79.251.145
IP address(es)
[01]: 10.79.251.146
[02]: fe80::3df2:2a4:b2e1:cb0
Hyper-V Requirements: VM Monitor Mode Extensions: Yes
Virtualization Enabled In Firmware: Yes
Second Level Address Translation: Yes
Data Execution Prevention Available: Yes
System 2 Without Strict Firewall Where Curl Command is Working:
C:\Users\Ashish Jain>systeminfo
Host Name: LAPTOP-79RV456R
OS Name: Microsoft Windows 10 Home Single Language
OS Version: 10.0.19043 N/A Build 19043
OS Manufacturer: Microsoft Corporation
OS Configuration: Standalone Workstation
OS Build Type: Multiprocessor Free
Registered Owner: Ashish Jain
Registered Organization:
Product ID: 00327-35105-52167-AAOEM
Original Install Date: 3/14/2021, 6:33:25 AM
System Boot Time: 7/14/2022, 5:34:13 PM
System Manufacturer: LENOVO
System Model: 81H7
System Type: x64-based PC
Processor(s): 1 Processor(s) Installed.
[01]: Intel64 Family 6 Model 78 Stepping 3 GenuineIntel ~2000 Mhz
BIOS Version: LENOVO 8QCN26WW(V1.14), 12/29/2020
Windows Directory: C:\WINDOWS
System Directory: C:\WINDOWS\system32
Boot Device: \Device\HarddiskVolume1
System Locale: en-us;English (United States)
Input Locale: 00004009
Time Zone: (UTC+05:30) Chennai, Kolkata, Mumbai, New Delhi
Total Physical Memory: 12,154 MB
Available Physical Memory: 7,634 MB
Virtual Memory: Max Size: 14,010 MB
Virtual Memory: Available: 8,057 MB
Virtual Memory: In Use: 5,953 MB
Page File Location(s): C:\pagefile.sys
Domain: WORKGROUP
Logon Server: \\LAPTOP-79RV456R
Hotfix(s): 15 Hotfix(s) Installed.
[01]: KB5013887
[02]: KB4562830
[03]: KB4577586
[04]: KB4580325
[05]: KB4589212
[06]: KB5000736
[07]: KB5015807
[08]: KB5006753
[09]: KB5007273
[10]: KB5011352
[11]: KB5011651
[12]: KB5014032
[13]: KB5014035
[14]: KB5014671
[15]: KB5005699
Network Card(s): 4 NIC(s) Installed.
[01]: VirtualBox Host-Only Ethernet Adapter
Connection Name: VirtualBox Host-Only Network
DHCP Enabled: No
IP address(es)
[01]: 192.168.56.1
[02]: fe80::f839:dc84:9a7b:3087
[02]: Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC
Connection Name: Wi-Fi
Status: Media disconnected
[03]: Realtek PCIe FE Family Controller
Connection Name: Ethernet
Status: Media disconnected
[04]: Bluetooth Device (Personal Area Network)
Connection Name: Bluetooth Network Connection
Status: Media disconnected
Hyper-V Requirements: VM Monitor Mode Extensions: Yes
Virtualization Enabled In Firmware: Yes
Second Level Address Translation: Yes
Data Execution Prevention Available: Yes
C:\Users\Ashish Jain>
I was able to make a successful request from System 2:
(base) C:\Users\Ashish Jain>curl "https://api.twitter.com/2/users/by/username/vantagepoint21" -H "Authorization: Bearer A***V"
{"data":{"id":"96529689","name":"Ashish Jain","username":"vantagepoint21"}}
(base) C:\Users\Ashish Jain>curl "https://api.twitter.com/2/users/by/username/elonmusk" -H "Authorization: Bearer A***V"
{"data":{"id":"44196397","name":"Elon Musk","username":"elonmusk"}}
The curl command is not working on the System 1.
I think there is some issue being created by Network Firewall settings in my office laptop. From which I was not able to get a response from Twitter API.
(base) C:\Users\ash\Desktop\twitter_api>curl "https://api.twitter.com/2/users/by/username/vantagepoint21" -H "Authorization: Bearer 9***2"
curl: (35) schannel: next InitializeSecurityContext failed: Unknown error (0x80092012) - The revocation function was unable to check revocation for the certificate.On further testing the "curl" command on 'System 1' for URLs with "http" and "https" protocols:
(base) C:\Users\ash\Desktop>curl www.survival8.blogspot.com
<HTML>
<HEAD>
<TITLE>Moved Permanently</TITLE>
</HEAD>
<BODY BGCOLOR="#FFFFFF" TEXT="#000000">
<H1>Moved Permanently</H1>
The document has moved <A HREF="http://survival8.blogspot.com/">here</A>.
</BODY>
</HTML>
Success for HTTP based URL
---
(base) C:\Users\ash\Desktop>curl https://survival8.blogspot.com
curl: (35) schannel: next InitializeSecurityContext failed: Unknown error (0x80092012) - The revocation function was unable to check revocation for the certificate.
(base) C:\Users\ash\Desktop>curl https://survival8.blogspot.com/2022/08/lets-talk-about-whataboutery.html
curl: (35) schannel: next InitializeSecurityContext failed: Unknown error (0x80092012) - The revocation function was unable to check revocation for the certificate.
Failure for HTTPS based URL.
---
Successful Testing With Another HTTP based URL:
(base) C:\Users\ash\Desktop>curl http://survival8.blogspot.com/2022/08/lets-talk-about-whataboutery.html
<!DOCTYPE html>
<html class='v2' dir='ltr' lang='en'>
<head>
<link href='https://www.blogger.com/static/v1/widgets/2975350028-css_bundle_v2.css' rel='stylesheet' type='text/css'/>
<meta content='width=1100' name='viewport'/>
<meta content='text/html; charset=UTF-8' http-equiv='Content-Type'/>
<meta content='blogger' name='generator'/>
<link href='http://survival8.blogspot.com/favicon.ico' rel='icon' type='image/x-icon'/>
<link href='http://survival8.blogspot.com/2022/08/lets-talk-about-whataboutery.html' rel='canonical'/>
<link rel="alternate" type="application/atom+xml" title="survival8 - Atom" href="http://survival8.blogspot.com/feeds/posts/default" />
<link rel="alternate" type="application/rss+xml" title="survival8 - RSS" href="http://survival8.blogspot.com/feeds/posts/default?alt=rss" />
<link rel="service.post" type="application/atom+xml" title="survival8 - Atom" href="https://draft.blogger.com/feeds/7823701911930369175/posts/default" />
<link rel="alternate" type="application/atom+xml" title="survival8 - Atom" href="http://survival8.blogspot.com/feeds/1169952638388485943/comments/default" />
<!--Can't find substitution for tag [blog.ieCssRetrofitLinks]-->
<meta content='http://survival8.blogspot.com/2022/08/lets-talk-about-whataboutery.html' property='og:url'/>
<meta content='Let’s talk about ‘Whataboutery’' property='og:title'/>
<meta content=' what·about·ery [ˌwɒtəˈbaʊtəri] NOUN BRITISH the technique or practice of responding to an accusation or dif...' property='og:description'/>
<title>survival8: Let’s talk about ‘Whataboutery’</title>
<style id='page-skin-1' type='text/css'><!--
/*
-----------------------------------------------
Blogger Template Style
Name: Simple
Designer: Blogger
URL: www.blogger.com
----------------------------------------------- */
/* Content
----------------------------------------------- */
body { ...
Also, note that if that was Authorization failure from Twitter API, then the output would still be a JSON format informative message:
DescriptionThe course is published by
'TRIUMPHANT INSTITUTE OF MANAGEMENT EDUCATION PVT.LTD'. You can find all the listings on
their website and samples mentioned in the work.
Check Authorization Letter Here: https://bit.ly/3usTzrC
You can further contact the organisation for any information from their website
https://www.time4education.com/ or by
[REDACTED]
DescriptionThe material is published by
'TRIUMPHANT INSTITUTE OF MANAGEMENT EDUCATION PVT.LTD'. You can find all the book
listings in their e-store and samples mentioned in the work.
Check Authorization Letter Here: https://bit.ly/3usTzrC
You can further contact the organisation for any information from their website
https://www.time4education.com/ or by
[REDACTED]
Nice job building your network!
Tip: If it's someone you don't know yet, you can follow them to see their updates or send an InMail.
At 100
You've sent more invitations than most
On LinkedIn, it's best to only connect with people you know. You can still send an InMail if you want to introduce yourself.
At 150
You're close to the weekly invitation limit
To avoid overwhelming the inbox of other members, only connect with people you know. For people you don't know, consider following them or sending an InMail instead.
At 180
You're close to the weekly invitation limit
To avoid overwhelming the inbox of other members, only connect with people you know. For people you don't know, consider following them or sending an InMail instead.
At 190
You're close to the weekly invitation limit
To avoid overwhelming the inbox of other members, only connect with people you know. For people you don't know, consider following them or sending an InMail instead.
Unable to connect to Gaurav Harbola. Try again later.
At 200
You’ve reached the weekly invitation limit
Connections benefit you more when you know them personally, so we have weekly limits to encourage better networks.
For people you don’t know, you can follow them to see their posts or send an InMail instead. If you’d still like to send an invitation, please try again next week.
If you continue to add people in the following week after the "Weekly Limit" is removed, your account would be temporarily blocked.
We've restricted your account temporarily
We think you may be using an automation tool to send invitations. To help guard against abuse, we don’t permit the use of software tools that automate activity on LinkedIn.
We showed you a warning about this previously, so for now, we have locked your account until May 28, 2022 11:27 PM PDT. Please try signing in again after this time. Please note that engaging further in such activity may result in permanent restriction of your account.
For more details, please visit our Help Center.
Subject: Discontinuation of Service in the United States
April 16, 2020
Dear Savefrom User:
As you may have heard, our industry has been under strenuous attacks by certain US copyright holders. Because of these attacks, it has become financially impractical for Savefrom to continue to provide services in the United States.
Accordingly, Savefrom will be terminating its services in the United States as of April 28, 2020.
We thank you for your past loyalty and patronage and wish you health and safety during the present health crisis and beyond.
Very truly yours,
Savefrom
Rank - Website - Monthly Visitors - Country of Origin - Category
1 Google.com 92.5B U.S. Search Engines
2 Youtube.com 34.6B U.S. TV Movies and Streaming
3 Facebook.com 25.5B U.S. Social Networks and Online Communities
4 Twitter.com 6.6B U.S. Social Networks and Online Communities
5 Wikipedia.org 6.1B U.S. Dictionaries and Encyclopedias
6 Instagram.com 6.1B U.S. Social Networks and Online Communities
7 Baidu.com 5.6B China Search Engines
8 Yahoo.com 3.8B U.S. News and Media
9 xvideos.com 3.4B Czech Republic Adult
10 pornhub.com 3.3B Canada Adult
...
41 Walmart.com 718.6M U.S. Marketplace
42 Bilibili.com 686.0M China Animation and Comics
43 Tiktok.com 663.2M China Social Networks and Online Communities
44 Paypal.com 657.2M U.S. Financial Planning and Management
45 Google.de 624.5M Germany Search Engines
46 Amazon.co.jp 619.2M Japan Marketplace
47 Aliexpress.com 611.0M China Marketplace
48 Amazon.de 608.8M Germany Marketplace
49 Rakuten.co.jp 593.4M Japan Marketplace
50 Amazon.co.uk 579.7M United Kingdom Marketplace
Your requested URL has been blocked as per the directions received from Department of Telecommunications, Government of India. Please contact administrator for more information.
Note: You can still open the link the Tor Browser.
2: Censorship in India (Part 2)
Censorship of trackers (discovered using qBit)
3: Now comes in the Tribler. What's that?
4: Getting the Magnet link for a Torrent download via qBitTorrent
5: Paste the Magnet link from qBit to Tribler
Then wait for Metadata to load.
6: Trackers information in Tribler
7: Peer info in Tribler
8: Caveat: Performance Issue in Tribler
Labels: Cyber Security, Indian Politics, Politics, Technology, Web Development, Web Scraping
The above screeshot was taken from Tor Browser on 20210704.
Before you continue to YouTube
Google uses cookies and data to:
1. Deliver and maintain services, like tracking outages and protecting against spam, fraud, and abuse
2. Measure audience engagement and site statistics to understand how our services are used
If you agree, we’ll also use cookies and data to:
1. Improve the quality of our services and develop new ones
2. Deliver and measure the effectiveness of ads
3. Show personalized content, depending on your settings
4. Show personalized or generic ads, depending on your settings, on Google and across the web
For non-personalized content and ads, what you see may be influenced by things like the content you’re currently viewing and your location (ad serving is based on general location). Personalized content and ads can be based on those things and your activity like Google searches and videos you watch on YouTube. Personalized content and ads include things like more relevant results and recommendations, a customized YouTube homepage, and ads that are tailored to your interests.
Click “Customize” to review options, including controls to reject the use of cookies for personalization and information about browser-level controls to reject some or all cookies for other uses. You can also visit g.co/privacytools anytime.
Labels: Technology,Cyber Security,Web Development,Web Scraping,
Most likely you are accessing this website because you had some issue with
the traffic coming from this IP. This router is part of the Tor Anonymity
Network, which is
dedicated to providing
privacy to people who need it most: average computer users. This
router IP should be generating no other traffic, unless it has been
compromised.
Tor sees use by many
important segments of the population, including whistle blowers,
journalists, Chinese dissidents skirting the Great Firewall and oppressive
censorship, abuse victims, stalker targets, the US military, and law
enforcement, just to name a few. While Tor is not designed for malicious
computer users, it is true that they can use the network for malicious ends.
In reality however, the actual amount of abuse is quite
low. This
is largely because criminals and hackers have significantly better access to
privacy and anonymity than do the regular users whom they prey upon. Criminals
can and do build,
sell, and trade far larger and more
powerful networks than Tor on a daily basis. Thus, in the mind of this
operator, the social need for easily accessible censorship-resistant private,
anonymous communication trumps the risk of unskilled bad actors, who are
almost always more easily uncovered by traditional police work than by
extensive monitoring and surveillance anyway.
In terms of applicable law, the best way to understand Tor is to consider it a
network of routers operating as common carriers, much like the Internet
backbone. However, unlike the Internet backbone routers, Tor routers
explicitly do not contain identifiable routing information about the source of
a packet, and no single Tor node can determine both the origin and destination
of a given transmission.
As such, there is little the operator of this router can do to help you track
the connection further. This router maintains no logs of any of the Tor
traffic, so there is little that can be done to trace either legitimate or
illegitimate traffic (or to filter one from the other). Attempts to
seize this router will accomplish nothing.
Furthermore, this machine also serves as a carrier of email, which means that
its contents are further protected under the ECPA. 18
USC 2707 explicitly allows for civil remedies ($1000/account
plus legal fees)
in the event of a seizure executed without good faith or probable cause (it
should be clear at this point that traffic with an originating IP address of
nyc-exit.privateinternetaccess.com should not constitute probable cause to seize the
machine). Similar considerations exist for 1st amendment content on this
machine.
If you are a representative of a company who feels that this router is being
used to violate the DMCA, please be aware that this machine does not host or
contain any illegal content. Also be aware that network infrastructure
maintainers are not liable for the type of content that passes over their
equipment, in accordance with DMCA
"safe harbor" provisions. In other words, you will have just as much luck
sending a takedown notice to the Internet backbone providers. Please consult
EFF's prepared
response for more information on this matter.
For more information, please consult the following documentation:
That being said, if you still have a complaint about the router, you may
email the maintainer. If
complaints are related to a particular service that is being abused, I will
consider removing that service from my exit policy, which would prevent my
router from allowing that traffic to exit through it. I can only do this on an
IP+destination port basis, however. Common P2P ports are
already blocked.
You also have the option of blocking this IP address and others on
the Tor network if you so desire. The Tor project provides a web service
to fetch a list of all IP addresses of Tor exit nodes that allow exiting to a
specified IP:port combination, and an official DNSRBL is
also available to
determine if a given IP address is actually a Tor exit server. Please
be considerate
when using these options. It would be unfortunate to deny all Tor users access
to your site indefinitely simply because of a few bad apples.