Zapatista Tribal Port Scan
Read about the Zapatista Tribal Port Scan (ZTPS)
The Zapatista Tribal Port Scan (ZTPS) uses the Java Virtual Machine available in all standard web browsers. The participating user simply visits the web site URL of a ZTPS implementation, and the scanning begins. Designed to be opened in a smallish browser window and minimized for all day scanning at home, work, or school, the ZTPS applet will scan a random port on a particular machine, from once per minute to once per hour. Using both TCP and UDP socket connections, ZTPS may be configured to randomly select from a list of text messages, some of which may be logged by targeted machines. (Messages flying over the fence.) A download button in the applet interface makes it easy for users to download ready-to-implement software, and full source code for their own purposes.ZTPS effectiveness improves with the number of participating user/activists, so collective participation, as always, is very important.
All copyrights for ZTPS are with the Electronic Disturbance Theater. This is just a redistribution of the original software by KELLERASSELN with the intention to bring it back to the public conscience.
The target of this port scan is the EACOP consortium
(Link to the target).
The East African Crude Oil Pipeline Project (EACOP) is a pipeline that
will transport oil produced from Uganda's Lake Albert oilfields to the
port of Tanga in Tanzania where the oil will then be sold onwards to
world markets.
With a length of 1440 kilometers, the EACOP will be the longest heated
oil pipeline in the world.
Extraction of oil in Uganda generates up to 34 million tons of carbon
emissions each year. EACOP will bring climate chaos and biodiversity loss
and is already causing serious human rights violations.
TotalEnergies is facing a historical lawsuit in France
for its failure to prevent human rights violations and environmental damage
linked to these oil exploration projects.
TotalEnergies decision to move forward with opening a
new oil frontier in Africa is in contradiction to their communication
strategy that depicts the oil major as climate conscious, responsible,
multi-energy company.
EACOP is a shareholder consortium of TotalEnergies
(62%), Uganda National Oil Company UNOC (15%), Tanzania Petroleum Development
Corporation TPDC (15%) and CNOOC Uganda (8%).
A total of 43 commercial banks and 30 reinsurance companies have made clear
they rule out supporting EACOP and
will not finance the project directly, a big success of the
#StopEACOP network.
Netzdemo Portal protests against new oil projects in Africa
and anywhere else in the world. We need to #StopEACOP.
You can become a part of it.
To reach the applet page
follow this link.
In your browser security settings: enable Java and enable JavaScript.
A description of how to enable Java in your web browser (see Note 1 below)
is given on our
support page.
The ZTPS Applet is a signed applet that runs safely in a "sandbox".
You need to do two things before running the ZTPS Applet in your web browser:
1. Make changes in the Java Control Panel:
2. Make changes in the java.policy file:
https://bsite.net
Open the java.policy file located in the subfolder
lib\security inside the Java Runtime Environment folder.
The JRE is normally installed in C:\Program Files(x86)\Java\jre{version}.
Add the following string to the grant section
grant {
....
// Allow ZTPS applet to connect to target
permission java.net.SocketPermission "66.96.162.148:*", "connect, accept ,resolve, listen";
}
Then save the file (you need to be Administrator for this).
Restart your browser and come back to this page.
It may take a few minutes until Java Applet is loaded.
When you are asked whether you want to run this application,
accept the risk and press "Run".
When you are asked whether to block potentially unsafe content
press "Don't block".
You might be asked a second time whether you want to run this
application. Click "Run".
The ZTPS applet displays messages such as "no connection"
or "no reply" ...
Well, this is a good sign, they show that the port scanning is ongoing.
Note 1: Running Java applets does not work with TOR proxy.
Java Applets do not run in Google Chrome.
In 2025,
Firefox, Safari, Opera and Tor browsers do not support applets.
Internet Explorer remains the last browser that supports applets.