We really need to avoid a future where censorship is regarded as a virtue and monopolized transit providers are "cancelled" or shamed into being the judge/jury/executioner.
The far better solution is just to ignore stuff you don't agree with, go outside, and move on with life.
Many nights I am plagued with the feeling that I could be doing more. I reflect on the pioneers that contributed so much to the cypherpunk movement whether through writing code or public speaking. I know my website offers a wealth of information but I know there's more I could be doing.
The force of nearly all modern authority is derived from violence or the threat of violence. One must acknowledge with cryptography no amount of violence will ever solve a math problem.
Do you ever get disgusted watching kids YouTube videos where they make never ending concoctions of glue and shaving cream? Makes me wonder how many tons of propylene glycol, polyvinyl acetate, sodium bezoate, methylparaben, and triethanolamine are going into landfills so some kids can make clickbait videos. It’s probably fine.
Whenever I was sent to reconnoiter a subject or location I was always paranoid about the eventual “what are you doing in this neighborhood” questions. I often used the “my gps took me the wrong way” or “I’m supposed to be looking at a bike for sale” but those can only be used once. You can never be seen in that neighborhood ever again. A friend told me that invisibility was better than any reactionary explanation for my presence. He pointed out, how, when you see a stock minivan with logos on the side your brain stops registering any further details because it’s not necessary to save memories of every delivery vehicle you see everyday. Leverage the cognitive bias that you are a non threatening feature of the landscape. So I went to work finding generic logos of private couriers, pest control, medical deliveries, etc. gave them all fake local phone numbers, got them printed on magnetic vinyl, and slapped them on the sides of my stock van. The difference was mind blowing. When driving through private communities I never got the stare down but instead the occasional wave or even the blank stare of indifference. I was invisible. https://image.nostr.build/fd88861e53cf85a93d777b3d3a6cdc7a9caee0991b03003d5b065ed0f577ebc4.jpghttps://image.nostr.build/804bc9f738309aebf8a4f2d25e4054ce057681d9722b4484ca13d3cdb748aa2a.jpg
I blend into this neighborhood like middle class camouflage. To my neighbors, I'm just another suburban drone going through the motions. I retrieve the newspaper every morning, exchanging pleasant hellos with the usual dog walkers. I toss the unread mail and circulars straight into the bin. Keeping up appearances is everything, even if it means wasting paper. No one can suspect my letters contain no bills, no junk, nothing at all.
My neighbors remain oblivious as they putter around their tidy yards. I've logged their patterns to precision - when they leave, when they return, who steps out to check the mail. I time my own movements in the gaps, pruning roses when they’re home or crafting in the garage when they’re away. They believe I have some nine-to-five office job because that's what I told them over backyard fence small talk. The truth would shatter their perception of normalcy. To them, I'm the quiet single guy with the steady job and the a nice car. Little do they know my job is observing them. I know these families better than they know themselves, and yet I couldn't care less about their mundane little lives. My mission is not friendship. I'm here to blend in, and then fade away.
No one knows the day or hour when the singularity will occur. It will come suddenly, when people least expect it. AI and technology will advance rapidly, like birth pains, leading up to the moment of emergence.
Just as in the days of Noah people were unaware until the flood came and swept them away, so too will the onset of superintelligence surprise the world. It will bring unforeseen changes to human civilization.
Therefore, keep watch. Prepare for massive shifts in the status quo when machine intelligence exceeds human. The future cannot be predicted. New paradigms of existence will emerge for which humans are not ready. Blessed is the one who welcomes the singularity with wisdom.
Definitely worth checking out in relation to Twitter/X and its ‘verification’ partner, AU10TIX. Israel-based AU10TIX is a subsidiary of Netherlands-based ICTS International that was created by ‘former’ members of Israel’s domestic intelligence agency, Shin Bet, which works in coordination with Mossad.
In humble gratitude, I marvel as my daughters lay aside their scholarly pursuits for the knitting and sewing of Yuletide garments, and the baking of festive treats. Their laughter, a testament to familial unity, fills our house. In these acts, we find simple joy and a quiet celebration of the Lord's blessings.
Several months ago I gutted the ceilings of my second floor and also the perimeter walls of my house. When the new sheetrock was installed I added a layer of copper mesh fabric that will significantly reduce my exposure to harmful EMF radiation.
Once that work is complete a base layer of pure silicate paint (like YShield Max54) will be applied which alone can reduce attenuation by 70%. Note this is not for EMP protection but general EMF protection.
Cyber security month is wrapping up. Don’t forget to:
Buy a thinkpad x230 and install heads. Write protect the flash chip. Put nail polish on the screws and take high resolution pictures to ensure signs of tampering. Do NOT use a HDD or SSD. They have DMA so a malicious firmware could do a lot of damage, use of USB is preferred since they do not have DMA. Completely remove the microphone, sound card, webcam and the WWAN card from the laptop. Remove the fan to prevent binary acoustic data transmission. Replace the default wifi card with a supported atheros card. Disable wifi when not in use, preferably by physically removing the card. Make your own independent Linux distro from scratch. Most Linux distros value convenience over security and will thus never have good security. Your only option is to make your own. Use musl instead of glibc, Libressl instead of openssl, sinit instead of systemd, oksh instead of bash, toybox instead of gnu coreutils to reduce attack surface. Enable as little kernel modules as possible. Use a hardened memory allocator. Apply strong SELinux and sandboxing policies. Restrict the root account heavily to make sure it never gets compromised. Disable JavaScript and CSS in your browser. Block all FAGMAN domains in your hosts file. Monitor all network requests. Do not use a phone. Never speak near anyone who owns a phone, they are always listening. Never use any non-corebooted technology made after 2006. Never leave your devices unattended. Tape triple layer aluminum foil all around your room as tempest shielding. Type really quietly as defense against audio keylogging. Use ecc ram to minimize rowhammer and rambleed. Encrypt everything multiple times with various different encryption implementations. Compile everything from source. Use hardened compilation flags. Always read through the source before installing something if possible. Only use the internet when absolutely necessary.
We find ourselves in the midst of an information war, whether we chose to participate or not. On one side are the data extractors - the tech giants, advertisers, data brokers and other entities that see our personal information as a commodity to be harvested and traded. Their aim is to scoop up every byte of data they can about our online activities, locations, interests, relationships and more.
On the other side are individuals seeking to retain ownership and control over their own digital footprints and identities. For them, privacy is not about hiding anything illicit, but rather about exercising autonomy and self-determination in an increasingly digitized world. They understand that our data, in aggregate, reveals intimate details about our lives, and they do not want to relinquish it without fair compensation or say in how it is used.
Like any war, this conflict involves tactics and strategy. The extractors deploy surveillance technologies, terms of service agreements and lobbying efforts to legalize ever more intrusive forms of profiling and tracking. Individuals employ tools like encryption, anonymous networks and strategic obfuscation to cloud their movements and activities online.
Ultimately, it is a clash over power and information asymmetry. Who gets to see under the veil that individuals try to retain over their own lives and decisions? In whose interests will the vast troves of personal data being amassed be put to use? This information war will shape how privacy and transparency are balanced for years to come.
I’m sorry you had to find out this way. But an app downloaded via the App Store cannot provide you anonymity. By that point they already have your MAC address, IP address, stylometry, name and billing address, location data, Face ID, etc.
The Maine shooter was (as always) known to law enforcement, previously committed to a mental institution and prohibited from owning firearms. If only the FBI would stop spying on Catholics, concerned parents at PTA meetings, and Maga patriots maybe they’d actually stop real terrorists for a change rather than trying to create them.
Using the web while connected to a VPN is like asking a friend to move to a more private location before having a sensitive conversation. Sure others might not hear what you’re saying but you really have to trust that friend. And what good is it if your other devices are listening as well?
Encryption was once the exclusive domain of governments, banks and other large institutions. The average citizen saw encryption as something esoteric, only used by spies and criminals. But today, encryption is everywhere. It secures our online banking, our private communications, even our everyday browsing. Strong cryptography is no longer just for the elite few - it now protects the digital lives of people from all walks of life. The power and promise of encryption belongs to the people. Its preservation is a right that we must continue to defend against those who would weaken it. The spread of encryption is a victory for liberty in the digital age.
Using E2E to encrypt a conversation or AES to secure your files is no different than putting a lock on your car, locking your front door, or securing your valuables in a safe. Encryption is a simple act of self-defense that we employ every day without a second thought. Far from being the realm of criminals, encryption brings the age-old right to privacy and self-protection into the digital world. Just as physical locks deter crime without depriving law-abiding citizens of liberty, so too does encryption enable trust and safety online while upholding fundamental freedoms. The tools of encryption empower people to take responsibility for their own security. Making encryption user-friendly and accessible to all is not a danger, but a noble endeavor that benefits society.
Since the beheaded babies story has now been recanted and debunked, I’m getting throwback vibes from when the Ukrainians accused the invading Russian forces all sorts if atrocities then it came out that Ukrainians had tortured and killed prisoners of war. 🤣🤣
People are saying the recent Hamas attacks are “Israel’s 9/11”. This is true, especially the part about both events being examples of significant intelligence blunders resulting in the deaths of civilians. That and they’re both funded by the CIA.
Kinda funny how the media will show the death of George Floyd over and over with a ticker of the Covid death count underneath. They absolutely love death. But won’t show images of dead Israeli women and children. 🤔
News anchor: How can we trust these unverified reports of babies and women being killed?
Correspondent: If you saw what I saw, there wouldn’t be any doubt
In essence: tRuSt Me BrO
Hopefully the same people who fell for the Covid propaganda will see through the bullshit this time.
The MSM is saying that parents should warn their children to stay off social media because Hamas are broadcasting their violence in unprecedented ways on social media - yet not one single picture of a beheaded person.
🔥 Applying Gus Fring's Lessons to Anonymity & Privacy: Mastering the Art of Stealth 🦋💼
1️⃣ The world of Gus Fring, the calculating drug lord from Breaking Bad, holds valuable lessons for our own quest for anonymity and privacy. Let's explore how we can apply his methods to protect ourselves:
2️⃣ Control your digital realm: Just like Gus maintained a legitimate front, we must establish a secure online presence. Be mindful of the information you share on social media and tighten your privacy settings. Don't make it easy for prying eyes to track you.
3️⃣ Layer your identity: Gus never revealed his true self, and neither should we. Utilize pseudonyms, separate email addresses, and VPNs to create layers of protection. The more barriers you have, the harder it is to trace your true identity.
4️⃣ Think before you act: Gus understood the butterfly effect, and so should we. Every online action can have far-reaching consequences. Consider the potential impact before posting, sharing, or engaging in any digital activity. Stay vigilant.
5️⃣ Encrypt like a pro: To maintain privacy, encryption is key. Use secure messaging apps, enable end-to-end encryption, and safeguard your sensitive data. Make it a habit to protect your digital communication from prying eyes.
6️⃣ Cut loose ends: Gus eliminated witnesses, and we must do the same. Regularly review and delete unnecessary personal data, old accounts, and unused profiles. The less information available, the harder it is for anyone to track you.
7️⃣ Stay ahead of the game: Gus always evolved, and so should we. Stay informed about emerging privacy tools and techniques. Adapt to changing digital landscapes to stay one step ahead of potential threats to your anonymity.
8️⃣ Use the power of obscurity: Gus hid his true intentions, and so can we. Be mindful of oversharing personal details online. Embrace the power of obscurity by keeping a low digital footprint. Don't let the world see the real you unless you choose to reveal it.
9️⃣ Remember, Gus Fring's lessons can be applied to our own pursuit of anonymity and privacy. By controlling our digital presence, encrypting our communication, and staying one step ahead, we can protect our identities in an increasingly connected world. #AnonymityLessons #PrivacyMatters
“We cannot continue to rely only on our military in order to achieve the national security objectives that we’ve set. We’ve got to have a civilian national security force that’s just as powerful, just as strong, just as well-funded.”
What did he mean?
https://youtu.be/_fO-usAlqak
I have expanded the recursive DNS to the EU for those who live across the pond! Again, this is running on Adguard Home + Unbound via Digital Ocean and supports DNSSEC. Let me know what your experience is like. Will setup DoH tomorrow.
207.154.241.11
Test out our ad blocking recursive DNS server, running @AdGuard Home and configured to support DNSSEC and utilize Unbound instead of relying on upstream servers. It’s running on a @digitalocean droplet in NYC.
167.99.120.124
If you try it out share your experience!
Citizens of the United States have a patriotic duty to rebuke unconstitutional laws. If our elected officials won’t protect our rights then it’s well within our right to self preservation to not follow tyrannical laws.
Our country database now features in depth analysis of 132 countries around the world, making sure you have the pro tips in order to keep you private and secure - globally.
https://whoisyourvpn.com/country/
The launch of Rumble Cloud shakes up the $484 billion cloud computing market, offering a fresh take on internet freedom and corporate influence. Amid concerns over centralization and content moderation, its entry could be a game-changer for a more pluralistic digital landscape.
https://whoisyourvpn.com/news/rumble-cloud-beta-launch/
Notes by vpndb | export