TOKYO MASTER BANNER

MINISTRY OF TOKYO
US-ANGLO CAPITALISMEU-NATO IMPERIALISM
Illegitimate Transfer of Inalienable European Rights via Convention(s) & Supranational Bodies
Establishment of Sovereignty-Usurping Supranational Body Dictatorships
Enduring Program of DEMOGRAPHICS WAR on Europeans
Enduring Program of PSYCHOLOGICAL WAR on Europeans
Enduring Program of European Displacement, Dismemberment, Dispossession, & Dissolution
No wars or conditions abroad (& no domestic or global economic pretexts) justify government policy facilitating the invasion of ancestral European homelands, the rape of European women, the destruction of European societies, & the genocide of Europeans.
U.S. RULING OLIGARCHY WAGES HYBRID WAR TO SALVAGE HEGEMONY
[LINK | Article]

*U.S. OLIGARCHY WAGES HYBRID WAR* | U.S. Empire's Casino Unsustainable | Destabilised U.S. Monetary & Financial System | U.S. Defaults Twice A Year | Causes for Global Financial Crisis of 2008 Remain | Financial Pyramids Composed of Derivatives & National Debt Are Growing | *U.S. OLIGARCHY WAGES HYBRID WAR* | U.S. Empire's Casino Unsustainable | Destabilised U.S. Monetary & Financial System | U.S. Defaults Twice A Year | Causes for Global Financial Crisis of 2008 Remain | Financial Pyramids Composed of Derivatives & National Debt Are Growing | *U.S. OLIGARCHY WAGES HYBRID WAR*

Who's preaching world democracy, democracy, democracy? —Who wants to make free people free?
[info from Craig Murray video appearance, follows]  US-Anglo Alliance DELIBERATELY STOKING ANTI-RUSSIAN FEELING & RAMPING UP TENSION BETWEEN EASTERN EUROPE & RUSSIA.  British military/government feeding media PROPAGANDA.  Media choosing to PUBLISH government PROPAGANDA.  US naval aggression against Russia:  Baltic Sea — US naval aggression against China:  South China Sea.  Continued NATO pressure on Russia:  US missile systems moving into Eastern Europe.     [info from John Pilger interview follows]  War Hawk:  Hillary Clinton — embodiment of seamless aggressive American imperialist post-WWII system.  USA in frenzy of preparation for a conflict.  Greatest US-led build-up of forces since WWII gathered in Eastern Europe and in Baltic states.  US expansion & military preparation HAS NOT BEEN REPORTED IN THE WEST.  Since US paid for & controlled US coup, UKRAINE has become an American preserve and CIA Theme Park, on Russia's borderland, through which Germans invaded in the 1940s, costing 27 million Russian lives.  Imagine equivalent occurring on US borders in Canada or Mexico.  US military preparations against RUSSIA and against CHINA have NOT been reported by MEDIA.  US has sent guided missile ships to diputed zone in South China Sea.  DANGER OF US PRE-EMPTIVE NUCLEAR STRIKES.  China is on HIGH NUCLEAR ALERT.  US spy plane intercepted by Chinese fighter jets.  Public is primed to accept so-called 'aggressive' moves by China, when these are in fact defensive moves:  US 400 major bases encircling China; Okinawa has 32 American military installations; Japan has 130 American military bases in all.  WARNING PENTAGON MILITARY THINKING DOMINATES WASHINGTON. ⟴  
Showing posts with label Tech. Show all posts
Showing posts with label Tech. Show all posts

May 25, 2016

Google Nazis Aim to Create Biometric Surveillance Databases






Google Nazis Aim to Create Biometric Surveillance Databases

https://www.theguardian.com/technology/2016/may/24/google-passwords-android

Google aims to kill passwords by the end of this year

Android users will be able to log in to services using a combination of their face, typing patterns, and how they move

Alex Hern
@alexhern

Tuesday 24 May 2016 22.54 AEST 




Google will begin testing an alternative to passwords next month, in a move that could do away with complicated logins for good.

The new feature, introduced to developers at the company’s I/O conference, is called the Trust API, and will initially be tested with “several very large financial institutions” in June, according to Google’s Daniel Kaufman.

Kaufman is the head of Google’s Advanced Technology and Projects group, where the Trust API was first created under the codename Project Abacus. Introduced last year, Abacus aims to kill passwords not through one super-secure replacement, but by mixing together multiple weaker indicators into one solid piece of evidence that you are who you say you are.


Biometric authentication is a powerful enabler ..."

https://www.theguardian.com/technology/2016/may/24/google-passwords-android



COMMENT

Google Big Brother is poised to collect biometric data.
Biometrics is used "to identify individuals in groups that are under surveillance" and is "considered also instrumental to the development of state authority" (source).
This amounts to Google Big Brother creating identity surveillance databases, which is not that far removed from collecting user DNA for storage in data banks.

Collection of biometric information by corporate, state and state-serving Nazis like Google (or any entity whatsoever) ought to be outlawed.
South African case study here.  Unable to skim this right now, but it looks like it might be interesting.





April 01, 2016

TOR vs VPN | WHICH TO USE

Source

The Tin Hat ... lol
https://thetinhat.com/tutorials/darknets/tor-vpn.html

 

TOR vs VPN | WHICH TO USE


Tor & VPN described as often conflated
-- but Tor & VPN are different
-- which is more suitable depends on context


Essentially:

Tor:  for activists & 'secret squirrels' / not for video downloads
[caution:  not bullet-proof]
vs
VPN:  for (not vital) everyday anonymity / good for downloads


VPNs

-- take connection
-- encrypt connection
-- pass connection through server
-- contact goes via VPN server to connection site sought
-- ie:  it provides encryption & diversion of your online traffic



A.
    -- what you are doing & who you are connecting with not visible
    -- eg. public wifi:  those watching get jumbled info sent to random server
    -- same applies to Internet Service Provider (ISP)


B. -- site visited does not know your geolocation (privacy enhanced)
    -- this permits by-passing geographic restrictions on services

Note:

* what you do through VPN is know by operator of the VPN
* VPN services claim not to log activity


 but this is only a representation that may be dishonoured

* eg. if VPN provider is issued with a court order for info on your activities
* VPN provider would likely find some way to link your activity back to you
* So:  VPN = good for low risk situations
* BUT not so good for anonymity against a state actor


Tor Browser
-- works differently
-- instead of connecting directly to server
-- your connection is encrypted, bounced around x3 servers ('relays' or 'nodes')
-- before being decrypted & sent to destination
-- FIRST SERVER - knows your location
-- SECOND SERVER - only knows data from FIRST SERVER
-- THIRD SERVER - only knows that data from SECOND SERVER
-- anonymity is provided as the third server cannot know origin of data

-- majority of Tor servers not 'malicious' (do not log activity)
-- nearly impossible to associate end-data of chain to origin
-- very effective / takes significant state actor effort to de-anonymise

-- bonus:  encryption by Tor to prevent - eg. ISP from seeing your traffic
-- caution:  decryption at last server ('exit relay')  = point of vulnerability
-- it is at this point your data can be spied upon
-- therefore regular HTTP unencrypted connection relay of data (a no-no)
-- can be read in its entirety at the exit relay by the operator of the exit relay
-- however, using an add-on like HTTPS-Everywhere
-- equals safely encrypted data

-- with HTTPS even malicious server could not de-anonymise
    * unless content contains personal info (email, name, address, etc)

 

COMMENT:
I'm confused.  If HTTPS is supposed to be an encryption add-on
-- how can a malicious server de-anonymise if personal data is included
-- if encryption is supposed to be in place?
-- makes no sense to me:  that's not encryption


TOR - HIGHER SECURITY PRIVACY BROWSING
ANONYMITY vs SPEED

-- much slower than VPN
-- but far better re anonymity
-- avoid watching videos or downloading torrents
-- bad for entire network & extremely slow

-- best for high level anonymity needs
-- eg. high threat levels = law enforcement scenarios
-- journalists dealing w. sensitive sources, whistleblowers, political activists
-- those living under oppressive state surveillance etc

[comment:  all of us under US empire mass surveillance oppression ... LOL]
-- use Tor if adversary is "more dangerous than a DMCA complaint" (copyright)
-- promises provided by VPN companies = not enough. Use Tor.
-- *do not treat Tor as if it were bullet-proof
-- with enough time, de-anonymization is possible by agencies such eg. NSA
-- using Tor = best bet, unless you are an NSA high-value target
-- using tor for low bandwidth static sites helps 'populate' the Tor traffic
-- & providing cover for those who need Tor for vital reasons
-- note:  Tor is only an ANONYMITY TOOL

-- without operational security (see OPSEC), anonymity tools rendered useless
-- watch bad habits - can reveal ID to the motivated adversary

-- keep torrenting to VPN

-- VPN - EVERYDAY BROWSING PRIVACY
-- VPN good for low-risk/bandwidth-heavy purposes
-- VPN's are good for VIDEOS & TORRENTS task


OPSEC
-- operational security
https://grugq.github.io/

The Grugq
-- teach operational security (OPSEC)
-- ie good security habits

http://grugq.tumblr.com/



Source:  The Tin Hat
https://thetinhat.com/tutorials/darknets/tor-vpn.html
 

January 06, 2016

One Man War on Tor


Unofficial / 'Civvies'
FBI Support for Tor?

[ CLICK image to enlarge / for clarity]

One Man War on Tor
[ CLICK image to enlarge / for clarity]

[ CLICK image to enlarge / for clarity]


Tor Project Runs Away From Public Questions at 32c3
Dec 29, 2015
http://surveillancevalley.net/blog/tor-project-runs-away-from-public-questions-at-32c3


Tor military contractors try to shut down my reporting
Dec 27, 2015
http://surveillancevalley.net/blog/tor-military-contractors-try-to-shutdown-my-reporting


[ CLICK image to enlarge / for clarity]


What Snowden won't tell you: The conflicted government ties of the Tor Project
Oct 11, 2015
http://surveillancevalley.net/blog/everything-you-need-to-know-about-the-tor-project


---------------------- ꕤ ----------------------

US Politics | Koch Industries

A People’s History of Koch Industries: How Stalin Funded the Tea Party Movement
http://exiledonline.com/a-peoples-history-of-koch-industries-how-stalin-funded-the-tea-party-movement/

---------------------- ꕤ ----------------------

[Tor's a privacy browser]
 
No time to properly read all of these right now, but I think the one-man-war on Tor is interesting, as is the lengthy Koch Industries article, I would say.

These are on the 'to-see' list.

The Tor 'debate' has been ongoing for a while, I think.

Not sure what the go is with Tor.  

I've no idea if it secure or not, or whether it's part of some US regime change greater strategy.

It's not the end of my world if it's not 100% secure, because the most I'd ever probably want to do with Tor would be to maybe bypass censorship or something like that.







January 01, 2016

Weev - 'Ian's death and antifa at CCC: why hackers must become nationalists'

Article
SOURCE
http://weev.livejournal.com/415737.html



        
Ian's death and antifa at CCC: why hackers must become nationalists. - Andrew Auernheimer
Oðinnsson. Market abuser. Internationally notorious computer criminal.

[Oðinnsson - Odin's son]

03:02 pm January 1st, 2016

People outside the technology industry don't quite understand the scope of Ian Murdock's contributions to the world. The internet is a big place. It has about a hundred million servers on it. Of those hundred million, about twelve percent are running Debian, Ian's distribution. After Slackware 8 came out in 2001, I switched to Debian and have been running it on my infrastructure since. Beyond servers, the most popular GNU/Linux system distributing for the desktop is called Ubuntu, and it uses Debian's core contributions.

By scope of deployment, Ian Murdock was one of the biggest contributors to the Internet in the world. Bill Gates and Linus Torvalds have shipped more widely deployed software, but Ian Murdock certainly exhibited a scale of contribution that approaches their level.

Over the past week Ian had his home invaded without cause. He was kidnapped at gunpoint and falsely charged with assaulting the officer who assaulted him. He subsequently committed suicide. Many people are commenting that he wasn't in a lucid state when he did so. I'm not so sure. His chances of seeing a California prison were very high. California state prisons are the worst in the nation. His chances of losing a significant bit of his assets to the state were also high. Ian had a lot of assets. Rather than endure torture in prison and a loss of his assets to those that were wronging him he killed himself. He was also hoping to catalyze retaliation in revenge against his tormentors, and his death will mean nothing if we don't make it so.

Before we go any further, let's examine the data.
[ GRAPHIC ]
This is a chart of various economic sectors and the total market cap of the associated companies. As you can see, of all the major sectors only financials exceed computing in value. I'm going to say pretty confident that none of them exceed computing in actual social contribution. This year, the Cybersecurity Information Sharing Act passed. It was regarded as a terrible thing and opposed by the entire computing industry. It passed anyways. Computing is twice the market value of the energy industry. When is the last time a bill universally opposed by the energy industry has passed? Never. Such a thing is unthinkable. It does not happen. Utilities, the smallest sector on this list, a fifth of computing's value, has a gigantic multiple of its political power. Computing is regularly made the bitch of the media industry through legislation, which is too small to even appear in this chart.

The food/staples retailing industry is very small in comparison to computing, but I quite assure you that in my home of Northwest Arkansas, the cops have a record of every family with a Walmart executive in it and they know damn well better not to fuck with them. Even a low level Walmart executive isn't going to get beaten, humiliated, and falsely charged in the Ozarks. It simply won't happen because the cops know who runs that place. In contrast, one of the most important contributors to computing on the earth just had that happen to him in San Francisco of all places. The telecom services industry is relatively tiny by comparison to computing, but it still petitioned the government to violate my rights and the protests of the entire computing industry did not prevent it.

Ian is dead for the same reason Lance and Jonathan and Aaron are: computing, as an industry, has no will to power. Computing is filled with nerds who want to focus on their own shit and think politics is stupid. They are right, politics is stupid, and I had the same worldview up until the point a gun was pointed in my face, my home was reduced to rubble, and I was being beaten and starved in solitary confinement. Computing's lack of will to power is especially tragic not only because it has the highest potential for power, but because the big players of the game realize that it does. Regardless of the apolitical nature of the industry it is being dragged into Marxist struggles anyways.

Over at Status451, @maradydd has a brilliant analysis of the feminist part of the cultural Marxist ecosystem that has now turned its eye towards the technology industry, but her reduction of cultural Marxism to a simple protection racket is flawed, because feminists are not the only force agitating against the tech industry, and well funded companies are not the only target.

The other thing that happened over the past week is that antifa was out in force at Chaos Communications Congress. If you are unfamiliar with this, it is the most prestigious gathering of hackers in the world. It is not something done for profit, but for the exchange of ideas amongst hacker luminaries. Unlike feminism, antifa has no profit model in this space, and even if it did, the CCC is not a well capitalized company. It is a loose association of hackers.

Antifa at CCC took the chance to protest emerson's talk as racist. I might be a white nationalist and have been so in public since 2008, but if I were to give a talk at CCC I don't see how I could even make it racist. These are technical talks about real world software deployments. The talk itself was about emerson's travels to Sierra Leone at great personal risk to help use open source software to assist with the eradication of the Ebola virus. Why would they choose this talk?

Let me tell you something. I, as a public white nationalist, have never had problems with these people. Nowadays they are afraid to even say my name. I am Voldemort-tier:

    @MariachiMacabre @davidsgallant (he went on to make real buddy buddy friends with W 3 3 V)
    — MisAndri ಠ_ಠ (@AndriErlingsson) December 30, 2015
    @molon_labia @jack_o_bee4u @dlw624 @PowersThatBeat @Sid_Fishous are we talking about haxor w. E. E. V? Don't want him to find his name
    — GlitterBombTheWorld (@SparkleChaos) December 23, 2015
I'll tell you why they chose that talk: someone who goes to Africa to try to help 3rd world people not die is more likely than a white nationalist to cower their head in accusations of racism. They are looking for easy victims to create a narrative with. Their bonuses depend on it.

As it turns out, there is an economic interest in keeping the hacker community docile, afraid, and Balkanized. The last term is best because it is the same guy that catalyzed the genocides in the Balkans who funds most antifa groups: George Soros. Just as he funded the destruction of Yugoslavia because the unification of Slavs presented a threat to his geopolitical interests, he, along with the Rothschilds and the Weinsteins, now funds attempts to culturally subjugate the hacker community. You know that chart we look at above? They are desperately attempting to keep the political elements of computing subdued by Marxism because a rebalance of power according to value would be against their interests and for yours. Most of these antifa types are paid shills, but a few of you are honestly fooled. You are being cuckolded, advocating directly against the interests of your own community and for the interests of predatory billionaires.
When you push leftwards, you are screaming for more corpses of men like Ian, Lance, and Aaron.

There's a table that all those other people eat at, and they don't want to clear a seat for your tribe at it. I learned something in prison: if someone takes your seat at a table, you pick something up and bash them with it repeatedly. Ian's death was a result of an act of disrespect and violence, an extension of continual disrespect that has emanated from the power establishment for decades now. It's going to continue until we respond in kind.

Embrace the will to power. We can seize it. It won't take very many of us.

http://weev.livejournal.com/415737.html




San Francisco Police Brutality
Death of Ian Murdock
Link | Post

---------------------- ꕤ ----------------------

COMMENT

Wow, that was interesting reading.

Will need to do some look ups, as I'm not familiar with those mentioned in the article (although I know 'Aaron' would be Aaron Schwartz).

Might leave the look-ups for later, as I'm struggling (headache).
The prison canteen tray imagery was funny.  Not sure if he meant it to be, as he really did do prison.