How to TOR

XaTuring lebt!
Antworten
Benutzeravatar
Bwana Honolulu
Hausmeistens|Hausmeister|Hausmeisterin
BeitrÀge: 12200
Registriert: 8. September 2010, 10:10
Disorganisation: Aktion 23, Zimmer523, GEFGAEFHB, ddR, Fractal Cult, EHNIX, The ASSBUTT
Wohnort: leicht verschoben
Pronomen: er/ihm
Kontaktdaten:

How to TOR

Beitrag von Bwana Honolulu »

The DOXBIN guide to safely running a Tor hidden service
nachash hat geschrieben:So, you want to be a darknet drug lord...
by nachash
[email protected]

[The advice in this article can be adapted to suit the needs of other
hidden services, including ones which are legal in your jurisdiction.
The threat model in mind is that of a drug market. The tone is that of a
grandfather who is always annoyingly right, who can't help but give a
stream-of-consciousness schooling to some whippersnapper about the way
the world works. If this article inspires you to go on a crime spree and
you get caught, don't come crying to me about it.]

You've decided that you're bored with your cookie-cutter life of working
at a no-name startup, getting paid in stock options and empty promises.
You want a taste of the good life. Good for you, kid. I used to run a
fairly popular hidden service (DOXBIN) that was seized by the FBI after
3 1/2 years of spreading continuous butthurt, then subsequently
repossessed from the feds. Because I managed to not get raided, I'm one
of the few qualified to instruct others on hidden services and security,
simply because I have more real-world experience operating hidden
services than the average tor user. In other words, very little of this
advice is of the armchair variety, as you'll often find in abundance the
Internet. But enough about me. Let's talk about your future as an
internet drug lord.

1. Legal/Political

First things first, you need to cover the legal, historical and
political angles. Read up on various drug kingpins and cartels from the
20th century. Learn everything you can about how they rose and fell (
you can safety ignore all the parts about intelligence agencies backing
one drug cartel over another, because that's not going to happen to
you). Once you've got a good command of that, read everything you can
about busted drug market operators and branch out into cybercrime
investigations as well. It wouldn't hurt to make yourself familiar with
law enforcement and intelligence agency tactics either. You'll find that
virtually all drug kingpins either get murdered or go to prison. Let
those lessons sink in, then find a good drug lawyer and make plans for
being able to pay them when The Man seizes everything you own. While
you're dreaming big about making fat stacks of fake internet money, do
some research on Mutual Legal Assistance Treaties and extradition treaties.

Mutual Legal Assistance Treaties (MLATs) are self-explanatory. Country A
will help Country B do whatever it takes to aid a cybercrime
investigation should some aspect of the crime bleed over into Country A.
Figure out which countries don't provide legal assistance to your
country in these cases, then find hosting services that are based there.
You'll shorten this list by determining which hosts allow tor, or at
least don't explicitly forbid it in their Terms of Service (you don't
care about exit bandwidth. You just want relays. Remember this for later
in the article). Last but not least, sort out which hosts accept payment
options that don't make you sweat bullets over the fact that the NSA has
been monitoring global financial transactions since at least the 1970s.
You will want to avoid any host that advertises itself as bulletproof --
they'll probably kit your box and siphon everything of value, in
addition to overcharging you for the privilege of running on older
hardware -- and any host which sells a cheap VPS and promises to
guarantee your privacy.

Extradition treaties mean that if you're in Country A and do something
that makes Country B want to prosecute you, Country A is most likely
going to give you a one way ticket to Country B. If or when your box
gets seized and you know the heat is on, you're going to want to beat it
to a place that won't send you back, where you will presumably live out
the rest of your days. Just make sure you've made enough money to grease
all the right palms in your new life, or the road ahead may be extremely
bumpy. If you're smart, you'll permanently move to this country well
before you have any trouble with law enforcement.

One last thing before moving on: Don't be so stupid as to attempt to
hire a hitman to kill anyone. Murder-related charges have no statute of
limitations, which means you won't get to write a tell-all book about
what a sly bastard you are when this wild ride is a distant memory. If
you've reached a point in your new career where murdering people makes
sense, it's time to walk away. Don't get corrupted like Dread Pirate
Roberts.

2. Technical

This section tries to be as operating system independent as possible.
You'll want to consult the documentation of your OS for specifics. The
technical side of running a hidden service and not getting owned by cops
is a lot harder than just installing stuff and crossing your fingers.
The recommendations in this section WILL NOT protect you from 0days in
the wild, but should help somewhat with damage control. Remember, if
they want to own your hidden service, it will probably happen eventually.

Before you even think about installing bitwasp and tor, you need to
really understand how tor works. Go to freehaven.net and read the white
papers until your eyes glaze over, then continue reading until you're
out of papers to read. Pay particular attention to the hidden service
papers. If you feel like you didn't understand something, come back to
that paper again when you have more knowledge. A lot of the papers
explain some of the same concepts with slight differences in the intros.
Don't skim over them, because you might read someone's rewording that
will clarify an idea for you. Check back with freehaven regularly. Once
you're up to speed, a good next step is to keep up with the tor
project's mailing lists. [1]

While you're doing all of this reading, it's (mostly) safe to go ahead
and install tor on a box on your local network, purely for
experimentation. Keep in mind that the NSA will start scooping up all of
your packets simply because you visited torproject.org. That means don't
post code questions related your drug market on Stack Exchange, if you
want to avoid giving The Man morsels he can use for parallel
construction. Once you've gotten hidden services working for http and
ssh, you're going to take the first baby step towards evading casual
discovery: Bind your hidden services to localhost and restart them.

The next step in your journey towards changing the drug business forever
is to grab the transparent proxying firewall rules for your operating
system to make sure they work. [2] They will guard against attacks that
cause your box to send packets to a box the attacker controls, which is
useful in thwarting attempts to get the box IP. You may wish to have a
setup similar to an anonymous middle box, preferably without public IPs
where possible, so if your application gets rooted tor isn't affected.

Speaking of applications, do everything you can to ensure that the
application code you use to power your hidden service isn't made of
Swiss cheese and used bandaids. To protect against other types of
attacks, you will want to identify any pre-compiled software that your
users will touch and compile it yourself with hardening-wrapper or it's
equivalent, plus any custom flags you want to use. If you keep
vulnerabilities from the application and server to a minimum, your
biggest worries will be tor-related.

You will only connect to your production box via a hidden service. It's
a good idea to get into that habit early. The only time deviating from
this pattern is acceptable is when you have to upgrade tor, at which
time you'll want to have a script ready that drops your firewall rules
and unbinds ssh from localhost just long enough for you to login, do the
upgrade, re-apply the firewall rules and bind ssh to localhost again. If
you're not ready to deal with the latency, you're not ready to do any of
this. Don't forget to transparently proxy the machine you use too, so
you don't slip up by mistake.

On the subject of the machine, you need to automate the process of both
setting up your hidden service and of destroying it. Proactively change
servers every few months, in order to frustrate law enforcement attempts
to locate and seize your site. Your creation script should install
everything your site needs as well as all configuration files. Your
clean-up script needs to destroy all evidence, preferably with a tool
like srm.

Regarding time-related issues: Always select either UTC or a time zone
that doesn't match the box's location. You will also do this to the box
you use to interact with your hidden service every day. If you read the
whitepapers, you will probably note a recurring theme of clock
skew-related attacks, mostly directed at clients, in some of the older
papers. Tor won't even start if the clock skew is off by too much.

If you want to have some fun at the expense of business in the short
term, intentionally take your service offline periodically in order to
mess up attempts to match your downtime with public information. If
you're the kind of person with access to botnets, you could DDoS
(Distributed Denial of Service) some provider at the same time on the
off chance that someone might connect the dots. This counter-measure
will only work on researchers looking at public info, not nation state
actors with an ax to grind.

I've saved some of the hardest stuff for the last part of this section.
It's hard because you have to make choices and it's unclear which of
those choices are the best. It's a bit like a Choose Your Own Adventure
book. In that spirit, all I can do is lay out the possibilities in as
much of a Herodotus-like way as possible.

One thing you have to consider is whether you want to run your hidden
service as a relay or not. If it's a relay, you'll have extra cover
traffic from other innocent tor users. But if your relay goes down at
the same time as your hidden service, it will be far more likely to be
noticed. Federal criminal complaints make a big deal of seized hidden
services not being relays, but three relays were taken down at around
the same time as Operation Onymous, so that's not a guaranteed defense.
The choice is yours.

Remember when I said to take note of hosts that don't ban tor outright?
This is the part where you give back to the community in the form of tor
relays or bridges. [3] The feel-good aspects of this move are along the
same lines as drug barons who build schools and hospitals, but this is
more immediately self-serving. You're going buy several servers to set
up strictly as relays or bridges, then configure your hidden service box
to use only those relays or bridges to enter the tor network. Here's
where things start to get theoretical.

If an adversary is running a guard node discovery attack -- in which an
attacker is able to determine the node you're using to enter the tor
network -- against your service and you're using your own relays as
entry nodes, the damage they can do will be limited to DoS (Denial of
Service) if your relays are not linkable to your identity. However, if
you're entering the tor network with bridge nodes, an attacker will
probably say "WTF?" at first unless they determine they've found a
bridge node. Bridge nodes don't use nearly as much bandwidth as relays
because there is not a public list of them, so an intelligence agency
would have less traffic to sift through, which makes correlation easier.
On the other hand, using bridge nodes also allows you to run obfsproxy
[4] on both the bridges and your hidden service. obfsproxy allows you to
make tor traffic appear to be another type of traffic, which is a good
defense against non-Five Eyes entities. For example, your hosting
provider may decide to monitor for tor traffic for their own reasons.
Just make sure your relays/bridges aren't linkable to you or to each other.

One last thing about guard node discovery attacks: The Naval Research
Lab published a paper in July 2014 about the "Sniper Attack," [5] which
in short works like this: The attacker discovers your guard nodes, then
uses an amplified DoS trick to exhaust the memory on all of your nodes.
The attacker keeps doing this until your hidden service uses guard nodes
that they control. Then it's game over. If your hidden service's entry
nodes are all specified in your torrc file and they get DoSed, your
service will go offline. In this situation, if all of your relays are
down, you essentially have an early warning canary that you're being
targeted. In other words: This is the best possible time to book your
one-way ticket to your chosen non-extradition country. For those of you
with a background in writing exploits, this is similar in principle to
how stack smashing protection will render some exploits either unable to
function or will turn them into a DoS. Personally, I recommend an
ever-changing list of relays or bridges. Add a few new ones at a
pre-determined interval, and gradually let old ones go unpaid.

3. Operational Security

This section is critical, especially when things start to break down. If
everything else goes bad, following this section closely or not could be
the difference between freedom and imprisonment.

This is important enough to re-state: Transparently proxy your tor
computer. This is a good first line of defense, but it is far from the
only way to protect yourself.

Do not contaminate your regular identity with your Onion Land identity.
You're an aspiring drug kingpin. Go out and pay cash for another
computer. It doesn't have to be the best or most expensive, but it needs
to be able to run Linux. For additional safety, don't lord over your new
onion empire from your mother's basement, or any location normally
associated with you. Leave your phone behind when you head out to manage
your enterprise so you aren't tracked by cell towers. Last but not least
for this paragraph, don't talk about the same subjects across identities
and take counter-measures to alter your writing style.

Don't log any communications, ever. If you get busted and have logs of
conversations, the feds will use them to bust other people. Logs are for
undercover cops and informants, and have no legitimate use for someone
in your position. Keep it in your head or don't keep it at all.

At some point, your enterprise is going to have to take on employees.
Pulling a DPR move and demanding to see ID from high-volume sellers and
employees will just make most people think you're a fed, which will
leave your potential hiring pool full of dumbasses who haven't even
tried to think any of this out. It will also make it easier for the feds
to arrest your employees after they get done arresting you. If your
enterprise is criminal in nature -- whether you're selling illegal goods
and services or you're in a repressive country that likes to re-educate
and/or kill dissidents -- an excellent way of flushing out cops is to
force them to get their hands not just dirty, but filthy, as quickly as
possible. Don't give them time to get authorization to commit a crime
spree. If there's a significant amount of time between when they're
given crimes to commit and the commission of those crimes, you need to
assume you've got an undercover cop on your hands and disengage. If they
commit the crime(s) more or less instantly, you should be fine unless
you've got the next Master Splynter on your trail. [6]

Disinformation is critical to your continued freedom. Give barium meat
tests to your contacts liberally. [7] It doesn't matter if they realize
they're being tested. Make sure that if you're caught making small talk,
you inject false details about yourself and your life. You don't want to
be like Ernest Lehmitz, a German spy during World War II who sent
otherwise boring letters about himself containing hidden writing about
ship movements. He got caught because the non-secret portion of his
letters gave up various minor personal details the FBI correlated and
used to find him after intercepting just 12 letters. Spreading
disinformation about yourself takes time, but after a while the tapestry
of deceptions will practically weave itself.

Ensure that your communications and data are encrypted in transit and at
rest whenever applicable. This means PGP for e-mail and OTR for instant
messaging conversations. If you have to give data to someone, encrypt it
first. For the tor-only box you use for interacting with your hidden
service, full disk encryption is required. Make a password that's as
long and complex as you can remember ("chippy1337" is not an example of
a good password). Last but not least, when you're done using your
dedicated tor computer, boot into memtest86+. Memtest86+ is a tool for
checking RAM for errors, but in order to do that it has to write into
each address. Doing so essentially erases the contents of the RAM.
Turning your computer off isn't good enough. [8] If you're planning to
use TAILS, it will scrub the RAM for you automatically when you shut
down. Once your RAM is clean, remove the power cord and any batteries if
you're feeling extra paranoid. The chips will eventually lose any
information that is still stored in them, which includes your key. The
feds can do a pre-dawn raid if they want, but if you follow this step
and refuse to disclose your password, you'll make James Comey cry like a
small child.

Use fake info when signing up for hosting services. Obfuscate the money
trail as much as possible and supply fake billing info. I prefer
registering as criminals who are on the run, high government officials,
or people I dislike. If your box gets seized and your hosting company
coughs up the info, or if a hacking group steals your provider's
customer database (It happens more often than you'd think), your hosting
information needs to lead to a dead end. All signs in Operation Onymous
point to operators being IDed because they used real info to register
for hosting service and then their box got decloaked.

Speaking of money, you're going to have to figure out how to launder
your newfound assets, and we're not talking about using a couple bitcoin
laundering services and calling it a day. You also shouldn't go out and
buy a Tesla. Living beyond your means is a key red flag that triggers
financial and fraud investigations. Remember, money is just another
attack vector. Washing ill-gotten gains is a time-honored drug business
tradition and one that you would be a fool not to engage in. You can
only use your hard-won profits to send shitexpress.com packages to
people you don't like so many times.

Take-away: If you rely only on tor to protect yourself, you're going to
get owned and people like me are going to laugh at you. Remember that
someone out there is always watching, and know when to walk away. Do try
to stay safe while breaking the law. In the words of Sam Spade, "Success
to crime!"



Sources:
[1] https://lists.torproject.org/cgi-bin/mailman/listinfo
[2] https://trac.torproject.org/projects/to ... arentProxy
[3] https://www.torproject.org/docs/bridges
[4] https://www.torproject.org/projects/obfsproxy.html.en
[5]
http://www.nrl.navy.mil/itd/chacs/bibli ... or-network
[6] http://www.pcworld.com/article/158005/article.html
[7] https://en.wikipedia.org/w/index.php?ti ... =624932671
[8]
https://freedom-to-tinker.com/blog/felt ... ncryption/
(via Teaologie)

Wer weiß, vielleicht ist das mal nĂŒtzlich. XD
Wenn ich schon der Affe bin, dann will ich der Affe sein, der dem Engel auf's Maul haut. XD
‒✮△♀ âœŽÓ©â–łÊ˜!
Seine Quasarische SphÀrizitÀt, der Bwana Honolulu,
Überbefehlshabender des Selbstmordkommandos Ω−,
Herrscher ĂŒber alles, alles andere und wieder nichts,
Urgroßpapapapst und Metagottkaiser in Zimmer523,
Grand Admirakel der berittenen Marinekavallerie zur See,
Reichsminister fĂŒr Popularpodicifikation,
HĂŒter des Heiligen Q.
Benutzeravatar
Bwana Honolulu
Hausmeistens|Hausmeister|Hausmeisterin
BeitrÀge: 12200
Registriert: 8. September 2010, 10:10
Disorganisation: Aktion 23, Zimmer523, GEFGAEFHB, ddR, Fractal Cult, EHNIX, The ASSBUTT
Wohnort: leicht verschoben
Pronomen: er/ihm
Kontaktdaten:

Re: How to TOR

Beitrag von Bwana Honolulu »

MakeUseOf hat geschrieben:5 Ways to Stay Safe From Bad Tor Exit Nodes

Bild

Tor is one of the most powerful tools for protecting your privacy on the Internet. But, as one recent experiment proved, its power comes with serious limitations. Today, we’re going to talk a little about how Tor works, what it does and does not do, and how to stay safe while using it.

Tor in a Nutshell

[BBvideo 640,390][/BBvideo]

Tor works like this: when you send a message through Tor, it’s sent on a randomly-generated course throughout the network, using a cryptographic technology known as “onion routing.” It’s a bit like sending a message sealed inside a series of envelopes. Each node in the network decrypts the message (opens the outermost envelope), and sends the still-encrypted result (inner sealed envelope) to its next address. As a result, no individual node can see more than a single link in the chain, and the path of the message becomes extremely difficult to trace.

Eventually, though, the message has to wind up somewhere. If it’s going to a “Tor hidden service,” which is a server connected directly to the Tor network, there’s no problem. If, however, you’re just using Tor as a proxy to access the regular Internet, it gets a little more complicated. At some point, your traffic needs to go through what’s called an ‘exit node’ – a Tor node which passes your packets along to the regular Internet.

Bild

Your traffic is vulnerable to snooping from these exit nodes. How bad is the problem? Luckily, some intrepid researchers have been doing some research on the subject.

Catching Bad Nodes

Mononymous Swedish security researcher “Chloe,” developed a clever technique for tricking corrupt nodes into outing themselves. Basically, it works like this: Chloe set up a website, using a legitimate-looking domain names and web design, to serve as a honeypot. For this specific test, she created a domain intended to resemble a Bitcoin merchant. She then downloaded a list of every exit node, logged onto Tor, and used each exit node in turn to log into the site, using a unique account specific to the exit node in question.

Then she sat back and waited for a month. Any nodes that were attempting to steal login credentials would see her login, steal her user name and password, and attempt to use it. Her honeypot websites would notice the multiple login attempts, and make a note. Because the passwords are unique to each node, Chloe can pin down exactly which node took the bait.

The results of the experiment are interesting. Of about 1400 exit notes, 16 attempted to steal the password and log in. This number isn’t too alarming on the face of it, but there are a few facts it’s worth remembering.

First, this is only picking up only the nodes that were interested in quickly stealing a few quick Bitcoins – in other words, the ambiently unscrupulous. More ambitious criminals, in contrast, probably wouldn’t show up in such a simple honeypot.

Second, the damage that can be done by even a single unscrupulous exit node is considerable, as an unrelated Swedish research learned in 2007. Security consultant Dan Egerstad ran five compromised Tor exit nodes as an experiment, and quickly found himself in possession of login credentials for thousands of servers all over the world – including those belonging to Australian, Indian, Iranian, Japanese, and Russian embassies. This came along with a tremendous amount of sensitive information.

Bild

Egerstad estimated that 95% of the traffic running through his nodes was unencrypted, giving him total access to their contents. After publishing some of this information online, Egerstad was raided by Swedish police, and taken into custody. He claims that one of the officers told him that the arrest was due to international pressure over the leak.

This was just five corrupt nodes! Clearly, even a scattering of corrupt Tor exit nodes poses a real problem. And, as Chloe has reported, Tor’s semi-centralized system for purging bad nodes has totally failed to take action against the bad nodes she did identify – they are still operating, and, presumably, still snooping.

How to Use Tor Safely

Luckily, the foreign powers whose information was compromised in this way were all making a basic mistake: namely, they misunderstood what Tor is, and what it’s for. Many people tend to assume that Tor is an end-to-end encryption tool, and it isn’t. Tor is designed to anonymize the origin of your browsing and messages – not their contents. If you’re using Tor to browse the web, any messages you send are easy for your exit node to snoop on. That provides a powerful incentive for unscrupulous people to set up exit nodes solely for espionage, theft, or blackmail.

The good news is, there are some simple tricks you can use to protect your privacy while using Tor.

Stay on the Dark Net

The easiest way to stay safe from bad exit nodes is not to use them: by sticking to using hidden services within Tor itself, you can keep all communication encrypted, without it ever having to cross over into the broader Internet. This works well when possible – but it’s not always practical. The dark net contains a tiny fraction of the websites available on the wider Internet, and what you want often isn’t available without leaving the network.

Bild

Use HTTPS

Another way to make Tor more secure is to augment it with an end-to-end encryption protocol. The most useful is probably HTTPS, which allows for you to communicate with websites in encrypted mode. HTTPS is enabled by default in Tor for sites that support it. Check to make sure that the HTTPS button is green before transmitting any potentially sensitive information.

Use Anonymous Services

You can also improve your safety by using websites and services that don’t report on your activities as a matter of course. For example, Google correlates your search activity to try to figure out who you are. Not for any malicious purpose – simply as part of their business model. As a result, you may want to use a service like Duck Duck Go, which retains no information about you as you use it. You can also combine Tor with services like Cryptocat to have (very) private conversations.

Avoid Personal Information

Going a little further, the safest way to avoid having personal information spied on is to avoid transmitting any to start with. Using Tor for research is fine, but avoiding uploading information to the greatest extent possible. Avoid chat, email, and forums whenever possible.

Avoid Logins

Finally, as a general rule, avoid websites that require you to login. Using Reddit through Tor is a potentially risky proposition, because it ties many different behaviors (browsing, posting, and commenting) together, giving a potential attacker a rich supply of information that could be used to identify you. You should also be careful to avoid services like Facebook which already know your identity, and give it to advertisers as a matter of course. Tor isn’t magic, and can’t protect you if you choose to give identifying information to a counterparty with no interest in protecting your privacy.

BildHow to Help

This is all well and good for those who are well-informed enough to use these tricks, but (sadly) many of those most in need for Tor (for example, citizens of oppressive regimes) are the least likely to be well informed about how to use it properly. Luckily, Chloe, the researcher who set up the original sting, has created a rundown of the project (called “BADONIONS”), along with some of the resources used. If you have the expertise, you can set up honeypots of your own and help identify bad nodes and keep Tor safe.
(vie cipherface)
Wenn ich schon der Affe bin, dann will ich der Affe sein, der dem Engel auf's Maul haut. XD
‒✮△♀ âœŽÓ©â–łÊ˜!
Seine Quasarische SphÀrizitÀt, der Bwana Honolulu,
Überbefehlshabender des Selbstmordkommandos Ω−,
Herrscher ĂŒber alles, alles andere und wieder nichts,
Urgroßpapapapst und Metagottkaiser in Zimmer523,
Grand Admirakel der berittenen Marinekavallerie zur See,
Reichsminister fĂŒr Popularpodicifikation,
HĂŒter des Heiligen Q.
Benutzeravatar
Bwana Honolulu
Hausmeistens|Hausmeister|Hausmeisterin
BeitrÀge: 12200
Registriert: 8. September 2010, 10:10
Disorganisation: Aktion 23, Zimmer523, GEFGAEFHB, ddR, Fractal Cult, EHNIX, The ASSBUTT
Wohnort: leicht verschoben
Pronomen: er/ihm
Kontaktdaten:

Re: How to TOR

Beitrag von Bwana Honolulu »

Wenn ich schon der Affe bin, dann will ich der Affe sein, der dem Engel auf's Maul haut. XD
‒✮△♀ âœŽÓ©â–łÊ˜!
Seine Quasarische SphÀrizitÀt, der Bwana Honolulu,
Überbefehlshabender des Selbstmordkommandos Ω−,
Herrscher ĂŒber alles, alles andere und wieder nichts,
Urgroßpapapapst und Metagottkaiser in Zimmer523,
Grand Admirakel der berittenen Marinekavallerie zur See,
Reichsminister fĂŒr Popularpodicifikation,
HĂŒter des Heiligen Q.
Benutzeravatar
Bwana Honolulu
Hausmeistens|Hausmeister|Hausmeisterin
BeitrÀge: 12200
Registriert: 8. September 2010, 10:10
Disorganisation: Aktion 23, Zimmer523, GEFGAEFHB, ddR, Fractal Cult, EHNIX, The ASSBUTT
Wohnort: leicht verschoben
Pronomen: er/ihm
Kontaktdaten:

Re: How to TOR

Beitrag von Bwana Honolulu »

Wenn ich schon der Affe bin, dann will ich der Affe sein, der dem Engel auf's Maul haut. XD
‒✮△♀ âœŽÓ©â–łÊ˜!
Seine Quasarische SphÀrizitÀt, der Bwana Honolulu,
Überbefehlshabender des Selbstmordkommandos Ω−,
Herrscher ĂŒber alles, alles andere und wieder nichts,
Urgroßpapapapst und Metagottkaiser in Zimmer523,
Grand Admirakel der berittenen Marinekavallerie zur See,
Reichsminister fĂŒr Popularpodicifikation,
HĂŒter des Heiligen Q.
Antworten