What I’ve noticed about reality is things are not what they seem. Here’s my two bits on the five sense prison and the new paradigms. Feel free to copy and redistribute my work with the one restriction of keeping it intact – all truth is free!

The Means Justifies The End

with one comment

The best defenses I have gleaned from watching the following hacker conference speeches and talks are listed below. The main defense is encryption. I’m more concerned than ever about the NSA’s invasion of privacy and illegal spying. Protect yourself from all this by using these tools.

Firstly, if these youtube links don’t work it’s probably because you’re not using HTTPS Everywhere – and you should be. Encrypt the connections. Disconnect2 helps prevent targeted advertising.

When browsing the web, use one of these search engines:

We shouldn’t be using microsloth windows. There’s a few options including Ubuntu Linux, Debian Linux or many Live Linux versions including Knoppix and Slax

Use open source software like Tor, Bitcoin and OpenPGP. WHERE TO GET PGP and GPG

Open source hardware like Raspberry Pi and users combinations are really innovative Onion Pi

Speaking of hardware you need to be behind a router, or better yet, a switch and not directly connected to the internet. Then flash your router with open source firmware. OpenWrt

You should do all of these things if you can. Basically, encryption just makes it hard for them to surveil you. They can still get what they are looking for but, it’ll have to be more worth their while. With metadata capture they will be able to decrypt it eventually, anyways.

Other things I learned lately are that the sim cards in mobile phones are full fledged computers in and of themselves. JPEGs and javascripts are capable of carrying trojans, malware and other virus like software. Government has mandated hardware backdoors, uses software like Finfisher and techniques like man in the middle and packet injection to gain access to everyones computers and private networks. They have even beaten the air gap by transmitting data computer to computer through speakers and microphones over distances up to a hundred feet.

Compromised companies include Dell, Cisco, Huawei, Facebook, Skype, AT&T, Microsoft, Google, Youtube and Yahoo. They are trying to mandate illegal surveillance and stifle freedoms by imposing censorship hidden in bills like SOPA, PIPA, ACTA and currently trying to pull another fast one with the TPP bill.

On the other hand, the power of the people to make change is noticable in places like Ecuador and Iceland. The global awakening is rocking India as well as almost everywhere else. There is plenty that is not being reported at all in the mainstream controlled media. So, it’s not entirely hopeless.

I’m really glad to see more people doing something about it.

The 30th Chaos Communication Congress

30c3: The Tor Network

30C3: To Protect And Infect – The militarization of the Internet

30c3: To Protect And Infect, Part 2

30c3: Through a PRISM, Darkly – Everything we know about NSA spying

30C3: Backdoors, Government Hacking and The Next Crypto Wars

It’s not just the NSA. It’s global. It’s the NWO. It’s the Number of the Beast, Revelations and Revelation of the Method. They’re not afraid to tell us all about it now. Their Orwellian State plan is almost complete. The biblical prophecy is a well used script. I feel like anything we do now is too little too late. I get the impression from listening to these people talk that although they are all very intelligent and grounded and rational they are missing the boat in the depth of the threat. This is a satanic endeavor that goes beyond the level of an extraterrestrial alien invasion fifth column scenario. Governments, religions and money are tools, no, weapons used against us. Resistance is futile – until we understand that.

India’s Surveillance State [30c3]


China’s All-Seeing Eye By Naomi Klein – May 14th, 2008

30C3: SOPA, NSA and the New Internet Lobby

The Eruption Begins – Twitter Activism Against TPP

30c3: Sysadmins of the world, unite! (incomplete)

Beyond the Tech: Building Internet Freedom Tools for Real People [30c3]

Concepts for global TSCM – getting out of surveillance state mode [30c3]

Seeing The Secret State: Six Landscapes [30c3]

The basic threat model the speakers are explaining is that metadata gathering is dangerous because people can be discredited at will based on almost any behaviour that they ever did in their entire lives. The next level threat model includes the ease which the collectors of the metadata and biometric information can lose or abuse it. To me the most dangerous threat model is predictive programming combined with current location to create plausible deniability for the people perpetuating false flags. Not to mention the obvious value of fresh location data for targeted drone attacks.

State of the Internet Address
Its Not So Bad We Can Hack It
All Your History Are Belong To Us


One Response

Subscribe to comments with RSS.

  1. i forgot to mention open office and basic protections like using strong passwords and encrypting your hard drive. Tor is good but theres weakness in all of these contermeasures. Encryption is not secure and neither is bitcoin. Remember the internet has always been DARPA.


    January 4, 2014 at 8:24 am

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: